Содержание
Mathematical Algorithms.- The Polynomial Composition Problem in (?/n?)[X].- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension.- Secure Delegation of Elliptic-Curve Pairing.- Side Channel Analysis.- Side-Channel Leakage across Borders.- Designing a Side Channel Resistant Random Number Generator.- Simple Power Analysis on Exponentiation Revisited.- Atomicity Improvement for Elliptic Curve Scalar Multiplication.- Systems.- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale.- Firewall Mechanism in a User Centric Smart Card Ownership Model.- Logical Attacks.- Combined Attacks and Countermeasures.- Attacks on Java Card 3.0 Combining Fault and Logical Attacks.- Fault Analysis.- Improved Fault Analysis of Signature Schemes.- When Clocks Fail: On Critical Paths and Clock Faults.- Privacy.- Modeling Privacy for Off-Line RFID Systems.- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings.- On the Design and Implementation of an Efficient DAA Scheme.