CARDIS - Proceedings
2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2008 | 2006 | 2004 | 2002 | 2000 | 1998 | 1996 | 1994 |
Proceedings
We are in the process of collecting all the proceedings of previous CARDIS, which should be soon available here.CARDIS at DBLP
14. CARDIS 2015: Bochum, Germany (DBLP, DOI)
Invited talks:- Keynote 1: "White-Box Cryptography and Smart Cards: Friend or Foe?", Brecht Wyseur
- Keynote 2: "Leakage Resilient Masking Schemes", Sebastian Faust (slides)
13. CARDIS 2014: Paris, France (DBLP, DOI)
Invited talks:- Keynote 1: "A Chip Card Sidelight on Lightweight Crypto", Marc Girault (slides)
- Keynote 2: "Designing Secure Smart Cards", Stefan Mangard
- Panel Discussion: "20 years of CARDIS, 40 years of smart cards: Where do we go from there?", David M'Raihi (Moderator)
12. CARDIS 2013: Berlin, Germany (DBLP, DOI)
11. CARDIS 2012: Graz, Austria (DBLP, Springer)
Java Card Security
- Michael Lackner, Reinhard Berlach, Christian Steger, Reinhold Weiss, Johannes Loinig and Ernst Haselsteiner
Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Checks (pdf, DOI, bibtex ) - Guillaume Barbu, Philippe Andouard and Christophe Giraud
Dynamic Fault Injection Countermeasure – A New Conception of Java Card Security (pdf, DOI) - Julien Lancia
Java Card combined attacks with localization-agnostic fault injection (pdf, DOI)
Protocols
- Sébastien Canard, Loïc Ferreira and Matt Robshaw
Improved (and Practical) Public-key Authentication for UHF RFID Tags (pdf, DOI) - Jan Hajny and Lukas Malina
Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards (pdf, DOI)
Side-Channel Attacks I
- Thomas Roche, Emmanuel Prouff and Jean-Sébastien Coron
On the Use of ShamirÂ’s Secret Sharing Against Side-Channel Analysis (pdf, DOI)
Luk Bettale
- Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cedric Murdica, and David Naccache
Low-Cost Countermeasure against RPA (pdf, DOI) - François Durvaux, Mathieu Renauld, Francois-Xavier Standaert, Loic Van Oldeneel Tot Oldenzeel and Nicolas Veyrat-Charvillon
Efficient Removal of Random Delays from Embedded Software Implementations using Hidden Markov Models (pdf, DOI)
Secure Multiple SBoxes Implementation with Arithmetically Masked Input (pdf, DOI)
Invited Talk
- N. Asokan
Mobile Platform Security (pdf)
Implementations
- Tolga Yalcin and Elif Bilge Kavun
On the Implementation Aspects of Sponge-based Authenticated Encryption for Pervasive Devices (pdf, DOI) - Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, Francois Koeune, Thomas Plos, Thomas Poppelmann, Francesco Regazzoni, Francois-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loic Van Oldeneel Tot Oldenzeel and Ingo von Maurich
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices (pdf, DOI) - Markus Pelnar, Michael Muehlberghuber and Michael Hutter
Putting Together What Fits Together – GrAEStl (pdf, DOI)
Implementations for Constrainted Devices
- Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto and Yutaka Miyake
Memory Access Pattern Protection for Resource-constrained Devices (pdf, DOI) - Petr Susil and Serge Vaudenay
Multipurpose Cryptographic Primitive ARMADILLO3 (pdf, DOI)
Side-Channel Attacks II
- David Oswald and Christof Paar
Improving Side-Channel Analysis with Optimal Pre-Processing Methods (pdf, DOI) - Sebastien Tiran and Philippe Maurine
SCA with Magnitude Squared Coherence (pdf, DOI) - Johann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis and Georg Sigl
Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis (pdf, DOI) - Timo Bartkewitz
Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines (pdf, DOI)
Invited Talk II
- David Naccache
Defensive Leakage Camouflage (pdf)