Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures.
Marc GiraultPublished in: CARDIS (1998)
Keyphrases
- smart card
- digital signature
- trusted third party
- information security
- remote user authentication scheme
- security analysis
- java card
- security mechanisms
- authentication protocol
- authentication scheme
- security requirements
- power analysis
- secret key
- security properties
- digital watermarking
- forward secure
- elliptic curve
- signature scheme
- blind signature scheme
- blind signature
- digital images