Smart Card Research and Advanced Applications: 13th by Marc Joye, Amir Moradi

By Marc Joye, Amir Moradi

This e-book constitutes the completely refereed post-conference court cases of the thirteenth overseas convention on clever Card examine and complex functions, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised complete papers awarded during this ebook have been rigorously reviewed and chosen from fifty six submissions. The papers are prepared in topical sections on Java playing cards; software program countermeasures; side-channel research; embedded implementations; public-key cryptography and leakage and fault assaults.

Show description

Read Online or Download Smart Card Research and Advanced Applications: 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers (Lecture Notes in Computer Science) PDF

Similar research books

The SAGE Handbook of Action Research: Participative Inquiry and Practice

'For somebody looking to create that means out of lifestyles, motivate others with ebook of study discoveries and insights, and support the realm turn into a greater position during which to reside and paintings, motion study holds nice promise as an strategy. The problem is to do it good and with rigor. The instruction manual is an impressive choice of articles that might aid the reader do all of that' - Richard E.

Condensed Matter Research Using Neutrons: Today and Tomorrow

The complex learn Workshop (ARW) on Condensed topic Re­ seek utilizing Neutrons, at the present time and day after today used to be held in Abingdon, Oxfordshire for 4 days starting 26 March 1984. The Workshop was once subsidized by means of NATO and the Rutherford Appleton Laboratory. a complete of 32 academics and individuals attended.

Responsive Open Learning Environments: Outcomes of Research from the ROLE Project

This ebook offers the results of 4 years of academic examine within the EU-supported venture known as function (Responsive on-line studying Environments). position expertise is headquartered round the notion of self-regulated studying that creates accountable inexperienced persons, who're in a position to severe considering and ready to plan their very own studying strategies.

Extra info for Smart Card Research and Advanced Applications: 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers (Lecture Notes in Computer Science)

Example text

5 1 Noise standard deviation (σ) 2 4 8 16 32 Noise standard deviation (σ) a = 0, b = 0, c = 1 in Eqn. (1) a = 1, b = 1, c = 1 in Eqn. 5 1 2 4 8 Noise standard deviation (σ) 16 32 For the sake of comparison, we proceed similarly for several well-known countermeasures. e. N ∼ N (0, σ 2 )). – Rotating S-box Masking (RSM) [14]: O = L(Z ⊕ M ) + N , where M is a low entropy mask chosen within a code. – Classical first-order Boolean masking1 : O = L(Z ⊕ M ) ∗ L(M ) + N , where M is a full entropy mask.

During run-time the checksums are re-calculated and compared to the off-card calculated checksums. Based on the required level of security all of these countermeasures are a possible solution to counteract integrity attacks into the bytecode area. These attacks are needed as a starting point of an attacker to reach the goal of turning valid applets into malicious one. These malicious applets are the starting point to create the proposed memory dump attack of this work on industrially used Java Cards.

2 Fault Detection Capability and Memory Consumption Only 256 bytes of each 4 KBytes table will be used by the cipher during normal operation. This seems like a waste of space but actually yields a very interesting feature of this countermeasure which is fault detection. We filled all unused values of our tables with 0’s, a value which is not in the (3, 6)-code. If a random byte fault occurs on the state of the AES, then the 0 value will be returned with probability (4096 − 256)/4096 = 93, 75 %. This makes a variant of an infective computation method [6], as the 0 will propagate to all future operations within the cipher and the ciphertext will have 0 values in place of key-dependent values for the affected bytes.

Download PDF sample

Rated 4.82 of 5 – based on 37 votes