Smart card research and applications : third International Conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 14-16, 1998 : proceedings

Bibliographic Information

Smart card research and applications : third International Conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 14-16, 1998 : proceedings

Jean-Jacques Quisquater, Bruce Schneier (eds.)

(Lecture notes in computer science, 1820)

Springer, c2000

Available at  / 32 libraries

Search this Book/Journal

Note

Includes bibliographical references and index

Description and Table of Contents

Description

Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Card Research and Advanced Applications, held in Louvain-la-Neuve, Belgium, 14-16 Sept- ber 1998. The ?rst CARDIS was held in Lille, France in November 1994, and the second was held in Amsterdam, The Netherlands in September 1996. The fourth CARDIS is scheduled to take place in Bristol, UK in September 2000 (http://www.cardis.org). This volume contains the refereed papers presented at CARDIS 1998. These 35 papers were ?rst published in a pre-proceedings and distributed to the - tendees at the conference; they have subsequently been revised and updated for this volume. The papers discuss all aspects of smart-card research: Java cards, elect- nic commerce applications, e?ciency, security (including cryptographic al- rithms, cryptographic protocols, and authentication), and architecture. Subm- sions from Europe, the U.S., Asia, and Australia show that this is indeed an international area of research, and one that is becoming more popular as pr- tical demand for smart cards increase. We wish to thank the Program Committee members who did an excellent job in reviewing papers and providing feedback to the authors.

Table of Contents

Session 1: Electronic Money and Commerce.- User-Defined Divisibility of Ecash and a Practical Implementation.- An Operational Model of QuickPay.- Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection.- The Banksys Signature Transport (BST) Protocol.- Session 2: The Java Card I.- The OpenCard Framework.- Smartcards - From Security Tokens to Intelligent Adjuncts.- Formal Proof of Smart Card Applets Correctness.- Session 3: The Java Card II.- Smart Card Payment over Internet with Privacy Protection.- Developing Smart Card-Based Applications Using Java Card.- The Performance of Modern Block Ciphers in JAVA.- Recoverable Persistent Memory for SmartCard.- Session 4: Attacks and Dealing with Speci c Threats.- Pirate Card Rejection.- Secure Authentication with Multiple Parallel Keys.- Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures.- A Practical Implementation of the Timing Attack.- Session 5: Authentication.- Techniques for Low Cost Authentication and Message Authentication.- Enhancing SESAMEV4 with Smart Cards.- How to Say "YES" with Smart Cards.- Session 6: Cryptography and Applications.- An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms.- Efficient Smart-Card Based Anonymous Fingerprinting.- Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol.- The Block Cipher BKSQ.- Session 7: Advanced Encryption Standard.- Serpent and Smartcards.- Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications.- Twofish on Smart Cards.- The Block Cipher Rijndael.- Session 8: Architectures and Designs.- Secure Log File Download Mechanisms for Smart Cards.- The Vault, an Architecture for Smartcards to Gain Infinite Memory.- A Data Driven Model for Designing Applications with Smart Cards.- Secure Personalization Using Proxy Cryptography.- Session 9: E cient Implementations I.- Recent Results on Modular Multiplications for Smart Cards.- RSA Signature Algorithm for Microcontroller Implementation.- Session 10: E cient Implementations II.- Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card.- Reducing the Collision Probability of Alleged Comp128.- Smart Card Crypto-Coprocessors for Public-Key Cryptography.

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

  • NCID
    BA48218347
  • ISBN
    • 3540679235
  • LCCN
    00045716
  • Country Code
    gw
  • Title Language Code
    eng
  • Text Language Code
    eng
  • Place of Publication
    Berlin
  • Pages/Volumes
    xi, 379 p.
  • Size
    24 cm
  • Classification
  • Subject Headings
  • Parent Bibliography ID
Page Top