LEADER 05054nam 22007695 450 001 996465573003316 005 20200705150044.0 010 $a3-642-37288-0 024 7 $a10.1007/978-3-642-37288-9 035 $a(CKB)3280000000007585 035 $a(DE-He213)978-3-642-37288-9 035 $a(SSID)ssj0000880068 035 $a(PQKBManifestationID)11559381 035 $a(PQKBTitleCode)TC0000880068 035 $a(PQKBWorkID)10873214 035 $a(PQKB)11597977 035 $a(MiAaPQ)EBC3093561 035 $a(PPN)169140172 035 $a(EXLCZ)993280000000007585 100 $a20130305d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSmart Card Research and Advanced Applications$b[electronic resource] $e11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers /$fedited by Stefan Mangard 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 297 p. 98 illus.) 225 1 $aSecurity and Cryptology ;$v7771 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-37287-2 327 $aTowards the Hardware Accelerated Defensive Virtual Machine ? Type and Bound Protection -- Dynamic Fault Injection Countermeasure: A New Conception of Java Card Security -- Java Card Combined Attacks with Localization-Agnostic Fault -- Improved (and Practical) Public-Key Authentication for UHF RFID. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards -- On the Use of Shamir?s Secret Sharing against Side-Channel Analysis -- Secure Multiple SBoxes Implementation with Arithmetically Masked Input -- Low-Cost Countermeasure against RPA -- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models -- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices -- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices -- Putting together What Fits together - GrĘStl -- Memory Access Pattern Protection for Resource-Constrained Devices -- Multipurpose Cryptographic Primitive ARMADILLO3 -- Improving Side-Channel Analysis with Optimal Linear Transforms -- SCA with Magnitude Squared Coherence -- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis -- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines -- Defensive Leakage Camouflage. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012. The 18 revised full papers presented together with an invited talk were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on Java card security, protocols, side-channel attacks, implementations, and implementations for resource-constrained devices. 410 0$aSecurity and Cryptology ;$v7771 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aSoftware engineering 606 $aComputer security 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aSoftware engineering. 615 0$aComputer security. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSoftware Engineering. 615 24$aSystems and Data Security. 676 $a004.6 702 $aMangard$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465573003316 996 $aSmart Card Research and Advanced Applications$9773154 997 $aUNISA