Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding.
Martin HenzlPetr HanácekPublished in: ISBAST (2013)
Keyphrases
- smart card
- authentication protocol
- information security
- secret key
- digital signature
- secure communication
- java card
- security analysis
- authentication scheme
- security requirements
- security enforcement
- security mechanisms
- fingerprint authentication
- power analysis
- remote user authentication scheme
- open source
- differential power analysis