Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Card Research and Advanced Applications, held in Louvain-la-Neuve, Belgium, 14-16 Sept- ber 1998. The ?rst CARDIS was held in Lille, France in November 1994, and the second was held in Amsterdam, The Netherlands in September 1996. The fourth CARDIS is scheduled to take place in Bristol, UK in September 2000 (http://www.cardis.org). This volume contains the refereed papers presented at CARDIS 1998. These 35 papers were ?rst published in a pre-proceedings and distributed to the - tendees at the conference; they have subsequently been revised and updated for this volume. The papers discuss all aspects of smart-card research: Java cards, elect- nic commerce applications, e?ciency, security (including cryptographic al- rithms, cryptographic protocols, and authentication), and architecture. Subm- sions from Europe, the U.S., Asia, and Australia show that this is indeed an international area of research, and one that is becoming more popular as pr- tical demand for smart cards increase. We wish to thank the Program Committee members who did an excellent job in reviewing papers and providing feedback to the authors.
Author(s): Eli Biham, Amichai Shulman (auth.), Jean-Jacques Quisquater, Bruce Schneier (eds.)
Series: Lecture Notes in Computer Science 1820
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2000
Language: English
Pages: 379
Tags: Data Encryption; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Operating Systems
Front Matter....Pages -
User-Defined Divisibility of Ecash and a Practical Implementation....Pages 1-18
An Operational Model of QuickPay....Pages 19-28
Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection....Pages 29-42
The Banksys Signature Transport (BST) Protocol....Pages 43-51
The OpenCard Framework....Pages 52-70
Smartcards – From Security Tokens to Intelligent Adjuncts....Pages 71-84
Formal Proof of Smart Card Applets Correctness....Pages 85-97
Smart Card Payment over Internet with Privacy Protection....Pages 98-104
Developing Smart Card-Based Applications Using Java Card....Pages 105-124
The Performance of Modern Block Ciphers in JAVA....Pages 125-133
Recoverable Persistent Memory for SmartCard....Pages 134-140
Pirate Card Rejection....Pages 141-149
Secure Authentication with Multiple Parallel Keys....Pages 150-156
Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures....Pages 157-166
A Practical Implementation of the Timing Attack....Pages 167-182
Techniques for Low Cost Authentication and Message Authentication....Pages 183-192
Enhancing SESAMEV4 with Smart Cards....Pages 193-202
How to Say “YES” with Smart Cards....Pages 203-212
An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms....Pages 213-220
Efficient Smart-Card Based Anonymous Fingerprinting....Pages 221-228
Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol....Pages 229-235
The Block Cipher BKSQ....Pages 236-245
Serpent and Smartcards....Pages 246-253
Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Cards Applications....Pages 254-264
Twofish on Smart Cards....Pages 265-276
The Block Cipher Rijndael....Pages 277-284
Secure Log File Download Mechanisms for Smart Cards....Pages 285-304
The Vault, an Architecture for Smartcards to Gain Infinite Memory....Pages 305-312
A Data Driven Model for Designing Applications with Smart Cards....Pages 313-325
Secure Personalization Using Proxy Cryptography....Pages 326-335
Recent Results on Modular Multiplications for Smart Cards....Pages 336-352
RSA Signature Algorithm for Microcontroller Implementation....Pages 353-356
Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card....Pages 357-365
Reducing the Collision Probability of Alleged Comp128....Pages 366-371
Smart Card Crypto-Coprocessors for Public-Key Cryptography....Pages 372-379
Back Matter....Pages -