On practical deployment of smart card based authenticated key agreement schemes.
Lukas MalinaJakub KonecnýPetr DzurendaJan HajnyPublished in: ICUMT (2017)
Keyphrases
- smart card
- java card
- secret key
- digital signature
- authentication protocol
- information security
- security analysis
- security requirements
- authentication scheme
- secure communication
- security mechanisms
- power analysis
- key agreement protocol
- modular exponentiation
- remote user authentication scheme
- resource constrained
- differential power analysis