Lecture Notes in Computer Science 6035

Similar documents
Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 4454

Lecture Notes in Computer Science 4728

Lecture Notes in Computer Science 5671

Lecture Notes in Computer Science 6663

Lecture Notes in Computer Science 3819

Lecture Notes in Computer Science 7480

Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 5004

Lecture Notes in Computer Science 4214

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 8341

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Computer Science 7342

Lecture Notes in Computer Science 4797

Lecture Notes in Computer Science 5474

Lecture Notes in Computer Science 6037

Research Reports ESPRIT

Lecture Notes in Computer Science 10644

Lecture Notes in Computer Science 4883

Detection of Intrusions and Malware, and Vulnerability Assessment

Lecture Notes in Computer Science 3527

Lecture Notes in Computer Science 4449

Lecture Notes in Computer Science 5083

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5438

Lecture Notes in Computer Science 7140

Lecture Notes in Computer Science 8036

Lecture Notes in Computer Science 5581

Lecture Notes in Computer Science 7149

Lecture Notes in Computer Science 6647

Lecture Notes in Computer Science 3507

Lecture Notes in Computer Science 9804

German Yearbook on Business History 1986

Lecture Notes in Computer Science 5587

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 7734

Lecture Notes in Computer Science 4355

Lecture Notes in Computer Science 6092

Lecture Notes in Computer Science 7679

Lecture Notes in Computer Science

Lecture Notes in Computer Science 7896

Lecture Notes in Computer Science 9249

Lecture Notes in Computer Science 6815

Lecture Notes in Computer Science 5284

Lecture Notes in Computer Science 7137

Lecture Notes in Computer Science 4006

CoPDA Barbara Rita Barricelli Ali Gheitasy Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Lecture Notes in Computer Science 6204

Lecture Notes in Computer Science 8031

Lecture Notes in Computer Science 7744

Lecture Notes in Artificial Intelligence 4327

Lecture Notes in Computer Science 3061

Lecture Notes in Computer Science 9211

Lecture Notes in Computer Science 9596

Lecture Notes in Computer Science 3925

Lecture Notes in Computer Science 6527

Current Position: Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science Massachusetts Institute of Technology

Curriculum Vitae for Marlis Buchman

Lecture Notes in Computer Science 7189

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

Curriculum Vitae Person Education Professional career

Lecture Notes in Computer Science 6705

Lecture Notes in Computer Science 5203

Arild Stubhaug. Gösta Mittag-Leffler. AManofConviction. Translated by Tiina Nunnally

Lecture Notes in Computer Science 6697

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Lecture Notes in Computer Science 7309

Lecture Notes in Computer Science 6084

Lecture Notes in Computer Science 10852

Lecture Notes in Computer Science 7384

Lecture Notes in Artificial Intelligence

Lecture Notes in Computer Science 4935

Emotional Engineering Volume 5

CoPDA Barbara Rita Barricelli Gerhard Fischer Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

The Founders of Index Theory

TRAVEL FELLOWSHIP. John Belle traveling in England between studies at the Architectural Association in London.

Lecture Notes in Computer Science 4498

American Literature. Narratives of Multiculturalism in Post-Imperial Turkey. Interamericana 10. Elena Furlanetto

Lecture Notes in Computer Science 6502

Study. Review of External Market Valuations of Properties Located Abroad. HypZert Professional Group International. As at: November 2011

This page intentionally left blank

Lecture Notes in Computer Science 6182

ISNI. International Society of Neuroimmunology PROFILE 2013

SERGIU KLAINERMAN CURRICULUM VITAE

Early Modern Philosophers and the Renaissance Legacy

Proceedings & Companion WikiSym 07, ISMM 07, HPC-GECO/CompFrame 07, DLS 07

Welcome to Workshop Designing Collaborative Interactive Spaces for e Creativity, e Science and e Learning AVI 2012, Capri, Italy, May 25 th.

Lecture Notes in Computer Science 6133

Studies in Epistemology, Logic, Methodology, and Philosophy of Science

Lecture Notes in Computer Science 10744

Lecture Notes in Computer Science 3376

Lecture Notes in Computer Science

EUROPEAN PRODUCT LIABILITY

Lecture Notes in Computer Science 5423

Lecture Notes in Computer Science 4044

Computers in Building: Proceedings of the CAADfutures'99 Conference

Transcription:

Lecture Notes in Computer Science 6035 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Dieter Gollmann Jean-Louis Lanet Julien Iguchi-Cartigny (Eds.) Smart Card Research and Advanced Application 9th IFIP WG 8.8/11.2 International Conference CARDIS 2010 Passau, Germany, April 14-16, 2010 Proceedings 13

Volume Editors Dieter Gollmann Hamburg University of Technology Institute for Security in Distributed Applications 21071 Hamburg, Germany E-mail: diego@tu-harburg.de Jean-Louis Lanet Julien Iguchi-Cartigny University of Limoges, XLIM 87000 Limoges, France E-mail: {jean-louis.lanet, julien.cartigny}@unilim.fr Library of Congress Control Number: 2010924121 CR Subject Classification (1998): E.3, C.2, K.6.5, D.4.6, H.4, J.1 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-12509-3 Springer Berlin Heidelberg New York ISBN-13 978-3-642-12509-6 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com IFIP International Federation for Information Processing 2010 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper 06/3180

Preface These proceedings contain the papers selected for presentation at CARDIS 2010, the 9th IFIP Conference on Smart Card Research and Advanced Application hosted by the Institute of IT-Security and Security Law (ISL) of the University of Passau, Germany. CARDIS is organized by IFIP Working Groups WG 8.8 and WG 11.2. Since 1994, CARDIS has been the foremost international conference dedicated to smart card research and applications. Every second year leading researchers and practitioners meet to present new ideas and discuss recent developments in smart card technologies. The fast evolution in the field of information security requires adequate means for representing the user in human machine interactions. Smart cards, and by extension smart devices with their processing power and their direct association with the user, are considered the first choice for this purpose. A wide range of areas including hardware design, operating systems, systems modelling, cryptography, and distributed systems contribute to this fast-growing technology. The submissions to CARDIS were reviewed by at least three members of the Program Committee, followed by a two-week discussion phase held electronically, where committee members could comment on all papers and all reviews. Finally, 16 papers were selected for presentation at CARDIS. There are many volunteers who offered their time and energy to put together the symposium and who deserve our acknowledgment. We want to thank all the members of the Program Committee and the external reviewers for their hard work in evaluating and discussing the submissions. We are also very grateful to Joachim Posegga, the General Chair of CARDIS 2010, and his team for the local conference management. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you find the proceedings stimulating. March 2010 Jean-Louis Lanet Dieter Gollmann

Organization General Chair Joachim Posegga University of Passau, Germany Program Chairs Jean-Louis Lanet Dieter Gollmann Université de Limoges, France Hamburg University of Technology, Germany Program Committee Liqun Chen Christophe Clavier Wolfgang Effing Benoit Feix Benedikt Gierlichs Louis Goubin Gilles Grimaud Marc Joye Josef Langer Cédric Lauradoux Kostas Markantonakis Vaclav Matyas Bernd Meyer Wojciech Mostowski Pierre Paradinas Emmanuel Prouff Jean-Jacques Quisquater Jean Marc Robert Jean-Jacques Vandewalle Hewlett-Packard, UK XLIM, France Giesecke & Devrient, Germany Inside Contactless, France COSIC Leuven, Belgium Université de Versailles, France Université de Lille, France Technicolor, France CDE Hagenberg, Austria INRIA Rhône-Alpes, Equipe SWING, France Royal Holloway, UK Masaryk University, Czech Republic Siemens AG, Germany University of Nijmegen, The Netherlands INRIA, France Oberthur Technology, France Université Catholique de Louvain, Belgium Ecole de technologie supérieure Montréal, Canada Gemalto, France Additional Reviewers Lejla Batina Samia Bouzefrane Guillaume Dabosville Elke De Mulder Simon Duquennoy Hermann Drexler Junfeng Fan Lars Hoffmann Jan Krhovjak François-Xavier Marseille Nathalie Mitton Kenny Paterson

VIII Organization Michael Roland Martin Seysen Petr Svenda Hugues Thiebeauld Vincent Verneuil Colin Walter Marc Witteman Local Organization Arne Bilzhause Sigline Böck Bastian Braun Agnes Grützner Peter Häring Daniel Hausknecht Michael Kaeufl Markus Karwe Guido Lenk-Blochowitz Simon Niechzial Henrich Pöhls Daniel Schreckling Martin Steininger Marita Ward

Table of Contents Mathematical Algorithms The Polynomial Composition Problem in (Z/nZ)[X]... 1 Marc Joye, David Naccache, and Stéphanie Porte Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension... 13 Qiasi Luo Secure Delegation of Elliptic-Curve Pairing... 24 Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, and Michael Scott Side Channel Analysis Side-Channel Leakage across Borders... 36 Jörn-Marc Schmidt, Thomas Plos, Mario Kirschbaum, Michael Hutter, Marcel Medwed, and Christoph Herbst Designing a Side Channel Resistant Random Number Generator... 49 Suresh N. Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin, Josyula R. Rao, Pankaj Rohotgi, Helmut Scherzer, Michael Steiner, and David C. Toll Simple Power Analysis on Exponentiation Revisited... 65 Jean-Christophe Courrège, Benoit Feix, and Mylène Roussellet Atomicity Improvement for Elliptic Curve Scalar Multiplication... 80 Christophe Giraud and Vincent Verneuil Systems Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale... 102 Geoffroy Cogniaux and Gilles Grimaud Firewall Mechanism in a User Centric Smart Card Ownership Model... 118 Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes Logical Attacks Combined Attacks and Countermeasures... 133 Eric Vetillard and Anthony Ferrari

X Table of Contents Attacks on Java Card 3.0 Combining Fault and Logical Attacks... 148 Guillaume Barbu, Hugues Thiebeauld, and Vincent Guerin Fault Analysis Improved Fault Analysis of Signature Schemes... 164 Christophe Giraud, Erik W. Knudsen, and Michael Tunstall When Clocks Fail: On Critical Paths and Clock Faults... 182 Michel Agoyan, Jean-Max Dutertre, David Naccache, Bruno Robisson, and Assia Tria Privacy Modeling Privacy for Off-Line RFID Systems... 194 Flavio D. Garcia and Peter van Rossum Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings... 209 Lejla Batina, Jaap-Henk Hoepman, Bart Jacobs, Wojciech Mostowski, and Pim Vullers On the Design and Implementation of an Efficient DAA Scheme... 223 Liqun Chen, Dan Page, and Nigel P. Smart Author Index... 239