Comparison of seven SHA-3 candidates software implementations on smart cards.
Mourad GouicemPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- smart card
- software implementation
- hardware design
- java card
- digital signature
- information security
- security requirements
- software systems
- software development
- secret key
- computer systems
- authentication protocol
- software architecture
- authentication scheme
- power analysis
- security analysis
- remote user authentication scheme
- operating system
- low cost