Vulnerability Analysis of a Commercial .NET Smart Card.
Behrang FouladiKonstantinos MarkantonakisKeith MayesPublished in: CARDIS (2013)
Keyphrases
- smart card
- secret key
- security requirements
- security analysis
- information security
- digital signature
- authentication scheme
- java card
- power analysis
- security enforcement
- differential power analysis
- authentication protocol
- security mechanisms
- secure communication
- fingerprint authentication
- remote user authentication scheme
- fuzzy vault