Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol (English)
- New search for: Alshehri, Ali
- New search for: Schneider, Steve
- New search for: Alshehri, Ali
- New search for: Schneider, Steve
In:
CARDIS, International Conference on Smart Card Research and Advanced Applications, 12
;
152-167
;
2014
-
ISSN:
- Conference paper / Print
-
Title:Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol
-
Contributors:Alshehri, Ali ( author ) / Schneider, Steve ( author )
-
Published in:Lecture Notes in Computer Science, Security and Cryptology ; 8419 ; 152-167
-
Publisher:
-
Publication date:2014
-
Size:16 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Contract Number:Chapter 11
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Evaluation of ASIC Implementation of Physical Random Number Generators Using RS LatchesKokubo, H. / Yamamoto, D. / Takenaka, M. / Itoh, K. / Torii, N. et al. | 2014
- 16
-
From New Technologies to New Solutions: Exploiting FRAM Memories to Enhance Physical SecurityKerckhof, S. / Standaert, F.-X. / Peeters, E. et al. | 2014
- 33
-
Low Entropy Masking Schemes, RevisitedGrosso, V. / Standaert, F.-X. / Prouff, E. et al. | 2014
- 44
-
On the Vulnerability of Low Entropy Masking SchemesYe, X. / Eisenbarth, T. et al. | 2014
- 61
-
A Machine Learning Approach Against a Masked AESLerman, L. / Medeiros, S.F. / Bontempi, G. / Markowitch, O. et al. | 2014
- 79
-
Clustering Algorithms for Non-profiled Single-Execution Attacks on ExponentiationsHeyszl, J. / Ibing, A. / Mangard, S. / De Santis, F. / Sigl, G. et al. | 2014
- 94
-
Optimization of Power Analysis Using Neural NetworkMartinasek, Z. / Hajny, J. / Malina, L. et al. | 2014
- 108
-
Time-Frequency Analysis for Second-Order AttacksBelgarric, P. / Bhasin, S. / Bruneau, N. / Danger, J.-L. / Debande, N. / Guilley, S. / Heuser, A. / Najm, Z. / Rioul, O. et al. | 2014
- 125
-
Vulnerability Analysis of a Commercial .NET Smart CardFouladi, B. / Markantonakis, K. / Mayes, K. et al. | 2014
- 140
-
Manipulating the Frame Information with an Underflow AttackFaugeron, E. et al. | 2014
- 152
-
Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon ProtocolAlshehri, A. / Schneider, S. et al. | 2014
- 171
-
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic CurvesRondepierre, F. et al. | 2014
- 187
-
Efficient and First-Order DPA Resistant Implementations of KeccakBilgin, B. / Daemen, J. / Nikov, V. / Nikova, S. / Rijmen, V. / Van Assche, G. et al. | 2014
- 200
-
Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic AttacksPerin, G. / Imbert, L. / Torres, L. / Maurine, P. et al. | 2014
- 219
-
The Temperature Side Channel and Heating Fault AttacksHutter, M. / Schmidt, J.-M. et al. | 2014
- 236
-
Glitch It If You Can: Parameter Search Strategies for Successful Fault InjectionCarpi, R.B. / Picek, S. / Batina, L. / Menarini, F. / Jakobovic, D. / Golub, M. et al. | 2014
- 253
-
Efficient Template AttacksChoudary, O. / Kuhn, M.G. et al. | 2014