Software attacks on smart cards.
Pierre GirardJean-Luc GiraudPublished in: Inf. Secur. Tech. Rep. (2003)
Keyphrases
- smart card
- java card
- differential power analysis
- power analysis
- remote user authentication scheme
- security mechanisms
- countermeasures
- information security
- static analysis
- hardware design
- security requirements
- secret key
- digital signature
- software architecture
- sensitive data
- security risks
- authentication scheme
- computer systems
- secure communication
- source code
- sys tems
- control flow
- rfid tags
- data flow
- software development
- authentication protocol
- software systems