Login / Signup
Is Java Card ready for hash-based signatures?
Ebo van der Laan
Erik Poll
Joost Rijneveld
Joeri de Ruiter
Peter Schwabe
Jan Verschuren
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
java card
smart card
fault injection
static analysis
byte code
countermeasures
virtual machine
elliptic curve
security model
control flow
method invocation
information security
signature scheme
secret key
public key
data flow
hash functions
pattern matching
database
main memory
cost effective
data mining