000 05790nam a22005535i 4500
001 978-3-540-44534-0
003 DE-He213
005 20160624101949.0
007 cr nn 008mamaa
008 121227s2000 gw | s |||| 0|eng d
020 _a9783540445340
_9978-3-540-44534-0
024 7 _a10.1007/10721064
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
245 1 0 _aSmart Card Research and Applications
_h[electronic resource] :
_bThird International Conference, CARDIS’98, Louvain-la-Neuve, Belgium, September 14-16, 1998. Proceedings /
_cedited by Jean-Jacques Quisquater, Bruce Schneier.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2000.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2000.
300 _aXI, 379 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1820
505 0 _aSession 1: Electronic Money and Commerce -- User-Defined Divisibility of Ecash and a Practical Implementation -- An Operational Model of QuickPay -- Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection -- The Banksys Signature Transport (BST) Protocol -- Session 2: The Java Card I -- The OpenCard Framework -- Smartcards – From Security Tokens to Intelligent Adjuncts -- Formal Proof of Smart Card Applets Correctness -- Session 3: The Java Card II -- Smart Card Payment over Internet with Privacy Protection -- Developing Smart Card-Based Applications Using Java Card -- The Performance of Modern Block Ciphers in JAVA -- Recoverable Persistent Memory for SmartCard -- Session 4: Attacks and Dealing with Speci c Threats -- Pirate Card Rejection -- Secure Authentication with Multiple Parallel Keys -- Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures -- A Practical Implementation of the Timing Attack -- Session 5: Authentication -- Techniques for Low Cost Authentication and Message Authentication -- Enhancing SESAMEV4 with Smart Cards -- How to Say “YES” with Smart Cards -- Session 6: Cryptography and Applications -- An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms -- Efficient Smart-Card Based Anonymous Fingerprinting -- Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol -- The Block Cipher BKSQ -- Session 7: Advanced Encryption Standard -- Serpent and Smartcards -- Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications -- Twofish on Smart Cards -- The Block Cipher Rijndael -- Session 8: Architectures and Designs -- Secure Log File Download Mechanisms for Smart Cards -- The Vault, an Architecture for Smartcards to Gain Infinite Memory -- A Data Driven Model for Designing Applications with Smart Cards -- Secure Personalization Using Proxy Cryptography -- Session 9: E cient Implementations I -- Recent Results on Modular Multiplications for Smart Cards -- RSA Signature Algorithm for Microcontroller Implementation -- Session 10: E cient Implementations II -- Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card -- Reducing the Collision Probability of Alleged Comp128 -- Smart Card Crypto-Coprocessors for Public-Key Cryptography.
520 _aSmart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Card Research and Advanced Applications, held in Louvain-la-Neuve, Belgium, 14-16 Sept- ber 1998. The ?rst CARDIS was held in Lille, France in November 1994, and the second was held in Amsterdam, The Netherlands in September 1996. The fourth CARDIS is scheduled to take place in Bristol, UK in September 2000 (http://www.cardis.org). This volume contains the refereed papers presented at CARDIS 1998. These 35 papers were ?rst published in a pre-proceedings and distributed to the - tendees at the conference; they have subsequently been revised and updated for this volume. The papers discuss all aspects of smart-card research: Java cards, elect- nic commerce applications, e?ciency, security (including cryptographic al- rithms, cryptographic protocols, and authentication), and architecture. Subm- sions from Europe, the U.S., Asia, and Australia show that this is indeed an international area of research, and one that is becoming more popular as pr- tical demand for smart cards increase. We wish to thank the Program Committee members who did an excellent job in reviewing papers and providing feedback to the authors.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aOperating systems (Computers).
650 0 _aData encryption (Computer science).
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aComputers and Society.
650 2 4 _aComputer Communication Networks.
650 2 4 _aOperating Systems.
700 1 _aQuisquater, Jean-Jacques.
_eeditor.
700 1 _aSchneier, Bruce.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540679233
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1820
856 4 0 _uhttp://dx.doi.org/10.1007/10721064
942 _2EBK4882
_cEBK
999 _c34176
_d34176