Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?
Constantinos MarkantonakisPublished in: SEC (2001)
Keyphrases
- smart card
- information security
- digital signature
- security analysis
- java card
- secure communication
- secret key
- security requirements
- differential power analysis
- authentication scheme
- power analysis
- security enforcement
- fingerprint authentication
- security mechanisms
- authentication protocol
- remote user authentication scheme