Embedding Formally Proved Code in a Smart Card: Converting B to C.
Antoine RequetGaëlle BossuPublished in: ICFEM (2000)
Keyphrases
- smart card
- java card
- information security
- security requirements
- secret key
- digital signature
- security mechanisms
- security analysis
- binary codes
- remote user authentication scheme
- static analysis
- authentication scheme
- secure communication
- authentication protocol
- power analysis
- security enforcement
- source code
- differential power analysis