


default search action
3rd CARDIS 1998: Louvain-la-Neuve, Belgium
- Jean-Jacques Quisquater, Bruce Schneier:

Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings. Lecture Notes in Computer Science 1820, Springer 2000, ISBN 3-540-67923-5
Session 1: Electronic Money and Commerce
- Eli Biham, Amichai Shulman:

User-Defined Divisibility of Ecash and a Practical Implementation. 1-18 - Pieter H. Hartel, Jake Hill, Matt Sims:

An Operational Model of QuickPay - Extended Abstract. 19-28 - Cristian Radu, Frederic Klopfert, Jan De Meester:

Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection. 29-42 - Michel Dawirs, Joan Daemen:

The Banksys Signature Transport (BST) Protocol. 43-51
Session 2: The Java Card 1
- Reto Hermann, Dirk Husemann, Peter Trommler:

The OpenCard Framework. 52-70 - Boris Balacheff, Bruno Van Wilder, David Chan:

Smartcards - From Security Tokens to Intelligent Adjuncts. 71-84 - Jean-Louis Lanet, Antoine Requet:

Formal Proof of Smart Card Applets Correctness. 85-97
Session 3: The Java Card 2
- Pui-Nang Chan, Samuel T. Chanson, Ricci S. C. Ieong, James Pang:

Smart Card Payment over Internet with Privacy Protection. 98-104 - Jean-Jacques Vandewalle, Eric Vétillard:

Developing Smart Card-Based Applications Using Java Card. 105-124 - Rüdiger Weis, Stefan Lucks:

The Performance of Modern Block Ciphers in Java. 125-133 - Didier Donsez, Gilles Grimaud, Sylvain Lecomte:

Recoverable Persistent Memory for SmartCard. 134-140
Session 4: Attacks and Dealing with Specific Threats
- David M. Goldschlag, David W. Kravitz:

Pirate Card Rejection. 141-149 - John Kelsey

, Bruce Schneier:
Secure Authentication with Multiple Parallel Keys. 150-156 - Marc Girault:

Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures. 157-166 - Jean-François Dhem, François Koeune, Philippe-Alexandre Leroux, Patrick Mestré, Jean-Jacques Quisquater, Jean-Louis Willems:

A Practical Implementation of the Timing Attack. 167-182
Session 5: Authentication
- Henri Gilbert:

Techniques for Low Cost Authentication and Message Authentication. 183-192 - Mark Looi, Paul Ashley

, Loo Tang Seet, Richard Au, Gary Gaskell, Mark Vandenwauver:
Enhancing SESAMEV4 with Smart Cards. 193-202 - Yair Frankel, Moti Yung:

How to Say "YES" with Smart Cards. 203-212
Session 6: Cryptography and Applications
- Feng Bao:

An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms. 213-220 - Josep Domingo-Ferrer, Jordi Herrera-Joancomartí

:
Efficient Smart-Card Based Anonymous Fingerprinting. 221-228 - Rob Jerdonek, Peter Honeyman, Kevin Coffman, Jim Rees, Kip Wheeler:

Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol. 229-235 - Joan Daemen, Vincent Rijmen:

The Block Cipher BKSQ. 236-245
Session 7: Advanced Encryption Standard
- Ross J. Anderson, Eli Biham, Lars R. Knudsen:

Serpent and Smartcards. 246-253 - Guillaume Poupard, Serge Vaudenay:

Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Card Applications. 254-264 - Bruce Schneier, Doug Whiting:

Twofish on Smart Cards. 265-276 - Joan Daemen, Vincent Rijmen:

The Block Cipher Rijndael. 277-284
Session 8: Architectures and Designs
- Constantinos Markantonakis:

Secure Log File Download Mechanisms for Smart Cards. 285-304 - Patrick Biget:

The Vault, an Architecture for Smartcards to Gain Infinite Memory. 305-312 - William J. Caelli, Vincent Cordonnier, Anthony Watson:

A Data Driven Model for Designing Applications with Smart Cards. 313-325 - Pierre Girard:

Secure Personalization Using Proxy Cryptography. 326-335
Session 9: Efficient Implementations 1
- Jean-François Dhem, Jean-Jacques Quisquater:

Recent Results on Modular Multiplications for Smart Cards. 336-352 - Guopei Qiao, Kwok-Yan Lam:

RSA Signature Algorithm for Microcontroller Implementation. 353-356
Session 10: Efficient Implementations 2
- Alain Durand:

Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card. 357-365 - Helena Handschuh, Pascal Paillier:

Reducing the Collision Probability of Alleged Comp128. 366-371 - Helena Handschuh, Pascal Paillier:

Smart Card Crypto-Coprocessors for Public-Key Cryptography. 372-379

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














