Table of Contents:
  • Mathematical Algorithms
  • The Polynomial Composition Problem in (?/n?)[X]
  • Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension
  • Secure Delegation of Elliptic-Curve Pairing
  • Side Channel Analysis
  • Side-Channel Leakage across Borders
  • Designing a Side Channel Resistant Random Number Generator
  • Simple Power Analysis on Exponentiation Revisited
  • Atomicity Improvement for Elliptic Curve Scalar Multiplication
  • Systems
  • Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale
  • Firewall Mechanism in a User Centric Smart Card Ownership Model
  • Logical Attacks
  • Combined Attacks and Countermeasures
  • Attacks on Java Card 3.0 Combining Fault and Logical Attacks
  • Fault Analysis
  • Improved Fault Analysis of Signature Schemes
  • When Clocks Fail: On Critical Paths and Clock Faults
  • Privacy
  • Modeling Privacy for Off-Line RFID Systems
  • Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings
  • On the Design and Implementation of an Efficient DAA Scheme.