Smart Card. Research and Applications: Third International Conference, CARDIS'98 Louvain-la-Neuve, Belgium, September 14-16, 1998 Proceedings
暂无分享,去创建一个
Session 1: Electronic Money and Commerce.- User-Defined Divisibility of Ecash and a Practical Implementation.- An Operational Model of QuickPay.- Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection.- The Banksys Signature Transport (BST) Protocol.- Session 2: The Java Card I.- The OpenCard Framework.- Smartcards - From Security Tokens to Intelligent Adjuncts.- Formal Proof of Smart Card Applets Correctness.- Session 3: The Java Card II.- Smart Card Payment over Internet with Privacy Protection.- Developing Smart Card-Based Applications Using Java Card.- The Performance of Modern Block Ciphers in JAVA.- Recoverable Persistent Memory for SmartCard.- Session 4: Attacks and Dealing with Speci c Threats.- Pirate Card Rejection.- Secure Authentication with Multiple Parallel Keys.- Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures.- A Practical Implementation of the Timing Attack.- Session 5: Authentication.- Techniques for Low Cost Authentication and Message Authentication.- Enhancing SESAMEV4 with Smart Cards.- How to Say "YES" with Smart Cards.- Session 6: Cryptography and Applications.- An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms.- Efficient Smart-Card Based Anonymous Fingerprinting.- Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol.- The Block Cipher BKSQ.- Session 7: Advanced Encryption Standard.- Serpent and Smartcards.- Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications.- Twofish on Smart Cards.- The Block Cipher Rijndael.- Session 8: Architectures and Designs.- Secure Log File Download Mechanisms for Smart Cards.- The Vault, an Architecture for Smartcards to Gain Infinite Memory.- A Data Driven Model for Designing Applications with Smart Cards.- Secure Personalization Using Proxy Cryptography.- Session 9: E cient Implementations I.- Recent Results on Modular Multiplications for Smart Cards.- RSA Signature Algorithm for Microcontroller Implementation.- Session 10: E cient Implementations II.- Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card.- Reducing the Collision Probability of Alleged Comp128.- Smart Card Crypto-Coprocessors for Public-Key Cryptography.