The Next Smart Card Nightmare - Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.
Guillaume BouffardJean-Louis LanetPublished in: Cryptography and Security (2012)
Keyphrases
- smart card
- java card
- differential power analysis
- security mechanisms
- remote user authentication scheme
- power analysis
- countermeasures
- static analysis
- security requirements
- secret key
- password guessing
- authentication protocol
- watermarking scheme
- s box
- information security
- secure communication
- security protocols
- watermarking algorithm
- digital signature
- denial of service attacks
- security model
- attack detection
- insider attacks
- security enforcement
- security analysis
- information systems