Elliptic curves in cryptography
Elliptic curves in cryptography
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Java Card Technology for Smart Cards: Architecture and Programmer's Guide
Java Card Technology for Smart Cards: Architecture and Programmer's Guide
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Smart Card Handbook
IEEE Micro
Smart Card Crypto-Coprocessors for Public-Key Cryptography
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Recent Results on Modular Multiplications for Smart Cards
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
A Practical Implementation of the Timing Attack
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Public-Key-Based High-Speed Payment (Electronic Money) System Using Contact-Less Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
An Implementation of DES and AES, Secure against Some Attacks
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Electromagnetic Analysis: Concrete Results
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Low Complexity Multiplication in a Finite Field Using Ring Representation
IEEE Transactions on Computers
Masking the Energy Behavior of DES Encryption
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
A smartcard for authentication in WLANs
LANC '03 Proceedings of the 2003 IFIP/ACM Latin America conference on Towards a Latin American agenda for network research
Proceedings of the 5th ACM international conference on Embedded software
A bi-channel voltage regulator protecting smart cards against power analysis attacks
Analog Integrated Circuits and Signal Processing
A ubiquitous smart home for elderly
Information Systems Frontiers
Side channel cryptanalysis on SEED
WISA'04 Proceedings of the 5th international conference on Information Security Applications
MobiCoin: digital cash for m-commerce
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
A vector approach to cryptography implementation
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Analysis of mobile authentication protocols by SVO logic
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.00 |
Complementary hardware and software have contributed to the success of smart cards. New chips and operating systems will further enhance performance and security.