IBM Systems Journal - Special issue on cryptology
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
A Timing Attack against RSA with the Chinese Remainder Theorem
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Electromagnetic Analysis: Concrete Results
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Optical Fault Induction Attacks
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A new CRT-RSA algorithm secure against bellcore attacks
Proceedings of the 10th ACM conference on Computer and communications security
Feasibility of smart cards in silicon-on-insulator (SOI) technology
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
On the importance of checking cryptographic protocols for faults
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Recovering data from USB flash memory sticks that have been damaged or electronically erased
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Single- and multi-core configurable AES architectures for flexible security
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
RFID-Tags for anti-counterfeiting
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Privacy for public transportation
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Case study on multiple fault dependability and security evaluations
Microprocessors & Microsystems
Hi-index | 0.00 |
Smart cards are widely known for their tamperresistance, but only contain a small amount of memory. Thoughvery small, this memory often contains highly valuable information(identification data, cryptographic key, etc). This is why itis subject to many attacks, as the other parts of the smart card,and thus requires appropriately chosen protections.The use of memories in smart cards induces security problems,but also other more particular ones. The main constraint isnaturally the limited physical expansion and integration, but faultlevel, aging and power consumption are not to be discarded.Indeed, deducing the context of a ROM using a microscopehas been proven to work. Interactions with light or eddycurrent on silicon can produce faults that might reveal importantinformation, as well.This article details the role of memory in smart card industries,in current context and future perspectives of smart cards andtheir applications. It then gives a survey of published physicalattacks targeting memory and all the existing techniques tocounter them.Great efforts are undertaken by industries and academicsto tackle specific memory problems introducing hardware andsoftware countermeasures in the designs. This struggle betweensecurity and hackers permits in the one hand tremendousbreakthroughs in research but in the other hand makes ratherdifficult for manufacturers to maintain cost effectiveness, that isone important factor for smart card.