Sciweavers

51 search results - page 6 / 11
» Transacted Memory for Smart Cards
Sort
View
FPL
2006
Springer
219views Hardware» more  FPL 2006»
15 years 3 months ago
FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks
This paper presents FPGA implementations of the DES and Triple-DES with improved security against power analysis attacks. The proposed designs use Boolean masking, a previously in...
François-Xavier Standaert, Gaël Rouvro...
IACR
2011
292views more  IACR 2011»
13 years 11 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
CCS
2009
ACM
15 years 6 months ago
Anonymous credentials on a standard java card
Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time usercentric identity management gains acceptance. Anonymous credential sch...
Patrik Bichsel, Jan Camenisch, Thomas Groß, ...
ISORC
2002
IEEE
15 years 4 months ago
Service Differentiation in Real-Time Main Memory Databases
The demand for real-time database services has been increasing recently. Examples include sensor data fusion, stock trading, decision support, web information services, and data-i...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic
CARDIS
2004
Springer
93views Hardware» more  CARDIS 2004»
15 years 5 months ago
On-the-Fly Metadata Stripping for Embedded Java Operating Systems
Considering the typical amount of memory available on a smart card, it is essential to minimize the size of the runtime environment to leave as much memory as possible to applicati...
Christophe Rippert, Damien Deville