User menu

Performance issues of selective disclosure and blinded issuing protocols on Java card

Bibliographic reference Tews, H. ; Jacobs, B.. Performance issues of selective disclosure and blinded issuing protocols on Java card.Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009 (Brussels, Belgium, 1-4 September 2009). In: Markowitch, O.; Bilas, A.; Hoepman, J.-H.; Mitchell, C.J.; Quisquater, J.-J.;, Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009, Springer verlag2009, p. 95-111
Permanent URL http://hdl.handle.net/2078.1/67492
  1. Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000), www.credentica.com
  2. Dowling, T., Duffy, A.: Java card key generation for identity based systems. Technical Report NUIM-CS-TR-2005-01, Department of Computer Science, National University of Ireland, Maynooth (February 2005), http://www.cs.nuim.ie/research/reports/2005
  3. Elo, T., Nikander, P.: Decentralized authorization with ECDSA on a Java smart card. In: Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, Norwell, MA, USA, pp. 345–364. Kluwer Academic Publishers, Dordrecht (2001)
  4. Garcia Flavio D., de Koning Gans Gerhard, Muijrers Ruben, van Rossum Peter, Verdult Roel, Schreur Ronny Wichers, Jacobs Bart, Dismantling MIFARE Classic, Computer Security - ESORICS 2008 (2008) ISBN:9783540883128 p.97-114, 10.1007/978-3-540-88313-5_7
  5. Garcia Flavio D., Rossum Peter van, Verdult Roel, Schreur Ronny Wichers, Wirelessly Pickpocketing a Mifare Classic Card, 10.1109/sp.2009.6
  6. Lenstra, A.: Key lengths. In: Bidgoli, H. (ed.) Handbook of Information Security. Information Warfare, Social, Legal, and International Issues and Security Foundations, vol. II, pp. 617–635. Wiley, Chichester (2006)
  7. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001)
  8. SUN Microsystems. Java Card v2.2.1 API (2003), http://java.sun.com/javacard/specs.html
  9. SUN Microsystems. Java Card v2.2.2 API (2005), http://java.sun.com/javacard/specs.html
  10. SUN Microsystems. Java Card Specifications Version 3.0 (2008), http://java.sun.com/javacard/downloads/
  11. Nohl, K., Evans, D., Starbug, S., Plötz, H.: Reverse-engineering a cryptographic RFID tag. In: 17th USENIX Security Symposium, San Jose, CA, USA, pp. 185–194 (2004)
  12. Smart N.P., Elliptic Curve Based Protocols, Advances in Elliptic Curve Cryptography ISBN:9780511546570 p.3-20, 10.1017/cbo9780511546570.003
  13. Verheul Eric R., Self-Blindable Credential Certificates from the Weil Pairing, Advances in Cryptology — ASIACRYPT 2001 (2001) ISBN:9783540429876 p.533-551, 10.1007/3-540-45682-1_31