Range Extension Attacks on Contactless Smart Cards.
Yossef OrenDvir SchirmanAvishai WoolPublished in: ESORICS (2013)
Keyphrases
- smart card
- java card
- security mechanisms
- differential power analysis
- remote user authentication scheme
- power analysis
- password guessing
- information security
- security requirements
- security analysis
- digital signature
- authentication protocol
- authentication scheme
- secure communication
- countermeasures
- secret key
- watermarking scheme
- digital images
- watermarking algorithm
- packet filtering
- password authentication
- distributed databases
- intrusion detection