Retrieving dates in smart card dumps is as hard as finding a needle in a haystack.
Thomas GougeonMorgan BarbierPatrick LacharmeGildas AvoineChristophe RosenbergerPublished in: WIFS (2017)
Keyphrases
- smart card
- secret key
- security requirements
- digital signature
- security analysis
- security mechanisms
- authentication scheme
- security enforcement
- java card
- remote user authentication scheme
- authentication protocol
- secure communication
- information security
- information retrieval
- power analysis
- electronic cash
- pattern matching