REFEREED PAPERS TRACK
Monday, May 10
Design
Feasibility of Smart Cards in Silicon-On-Insulator (SOI) Technology
Amaury Nève, Denis Flandre, and Jean-Jacques Quisquater, Université Catholique de Louvain
Design Principles for Tamper-Resistant Smartcard Processors
Oliver Kömmerling, Advanced Digital Security Research; Markus G. Kuhn, University of Cambridge
Which Security Policy for Multiapplication Smart Cards?
Pierre Girard, Cryptography and Security R&D, GEMPLUS
Ciphers
Efficient Block Ciphers for Smartcards
Joan Daemen, Proton World International; Vincent Rijmen, K.U.Leuven
PKCS #15--A Cryptographic-Token Information Format Standard
Magnus Nyström, RSA Laboratories
Remotely Keyed Encryption Using Non-Encrypting Smart Cards
Stefan Lucks and Rüdiger Weis, University of Mannheim
Authentication I
Smartcard Integration with Kerberos V5
Naomaru Itoi and Peter Honeyman, University of Michigan, Ann Arbor
Mutual Authentication with Smart Cards
Bastiaan Bakker, Delft University of Technology
Software License Management with Smart Cards
Tuomas Aura, Helsinki University of Technology; Dieter Gollmann, Microsoft Research
 
Tuesday, May 11
Authentication II
Beyond Cryptographic Conditional Access
David M. Goldschlag and David W. Kravitz, Divx
Providing Authentication to Messages Signed with a Smart Card in Hostile Environments
Tage Stabell-Kulø, Ronny Arild, and Per Harald Myrvang, University of Tromsø
Authenticating Secure Tokens Using Slow Memory Access
John Kelsey and Bruce Schneier, Counterpane Systems
Operating Systems
SCFS: A UNIX Filesystem for Smartcards
Naomaru Itoi, Peter Honeyman, and Jim Rees, University of Michigan, Ann Arbor
Secure Object Sharing in Java Card
Michael Montgomery and Ksheerabdhi Krishna, Austin Product Center, Schlumberger
Object Lifetimes in Java Card
Marcus Oestreicher, Zurich Research Laboratory, IBM Research Division; Ksheerabdhi Krishna, Austin Product Center, Schlumberger
A Personal Naming and Directory Service for Mobile Internet Users
Alain Macaire and David Carlier, Gemplus Research Lab
Threats
Investigations of Power Analysis Attacks on Smartcards
Thomas S. Messerges and Ezzy A. Dabbish, Motorola Labs; Robert H. Sloan, University of Illinois at Chicago
Risks and Potentials of Using EMV for Internet Payments
Els Van Herreweghen, IBM Zurich Research Laboratory; Uta Wille, Jelmoli Information Systems
Breaking Up Is Hard to Do: Modeling Security Threats for Smart Cards
Bruce Schneier, Counterpane Systems; Adam Shostack, Netect, Inc.