Login / Signup
Is Java Card Ready for Hash-Based Signatures?
Ebo van der Laan
Erik Poll
Joost Rijneveld
Joeri de Ruiter
Peter Schwabe
Jan Verschuren
Published in:
IWSEC (2018)
Keyphrases
</>
java card
smart card
fault injection
byte code
static analysis
countermeasures
virtual machine
control flow
hash functions
elliptic curve
method invocation
case study
security analysis
secret key
data flow
information security
source code
low cost