LEADER 04454nam 22007695 450 001 9910483355603321 005 20251226202648.0 010 $a3-642-37288-0 024 7 $a10.1007/978-3-642-37288-9 035 $a(CKB)3280000000007585 035 $a(DE-He213)978-3-642-37288-9 035 $a(SSID)ssj0000880068 035 $a(PQKBManifestationID)11559381 035 $a(PQKBTitleCode)TC0000880068 035 $a(PQKBWorkID)10873214 035 $a(PQKB)11597977 035 $a(MiAaPQ)EBC3093561 035 $a(PPN)169140172 035 $a(EXLCZ)993280000000007585 100 $a20130305d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSmart Card Research and Advanced Applications $e11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers /$fedited by Stefan Mangard 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 297 p. 98 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v7771 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-37287-2 327 $aTowards the Hardware Accelerated Defensive Virtual Machine ? Type and Bound Protection -- Dynamic Fault Injection Countermeasure: A New Conception of Java Card Security -- Java Card Combined Attacks with Localization-Agnostic Fault -- Improved (and Practical) Public-Key Authentication for UHF RFID. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards -- On the Use of Shamir?s Secret Sharing against Side-Channel Analysis -- Secure Multiple SBoxes Implementation with Arithmetically Masked Input -- Low-Cost Countermeasure against RPA -- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models -- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices -- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices -- Putting together What Fits together - GrĘStl -- Memory Access Pattern Protection for Resource-Constrained Devices -- Multipurpose Cryptographic Primitive ARMADILLO3 -- Improving Side-Channel Analysis with Optimal Linear Transforms -- SCA with Magnitude Squared Coherence -- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis -- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines -- Defensive Leakage Camouflage. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012. The 18 revised full papers presented together with an invited talk were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on Java card security, protocols, side-channel attacks, implementations, and implementations for resource-constrained devices. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v7771 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aSoftware engineering 606 $aData protection 606 $aComputer Communication Networks 606 $aCryptology 606 $aIT Operations 606 $aAlgorithms 606 $aSoftware Engineering 606 $aData and Information Security 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aSoftware engineering. 615 0$aData protection. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aSoftware Engineering. 615 24$aData and Information Security. 676 $a004.6 702 $aMangard$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483355603321 996 $aSmart Card Research and Advanced Applications$93004629 997 $aUNINA