2019
DOI: 10.1007/s11280-019-00715-8
|View full text |Cite
|
Sign up to set email alerts
|

Secure limitation analysis of public-key cryptography for smart card settings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…The paper "Secure Limitation Analysis of Public-key Cryptography for Smart Card Settings" [38] focuses on a special case of smart card used in intelligent application systems with high security requirements. The authors first summarize the features of three main types of attacks in smart card security, including invasive attacks, semi-invasive attacks, and noninvasive attacks, and review the public key cryptography algorithms regarding security issues.…”
Section: Privacy and Security In Smart Computingmentioning
confidence: 99%
“…The paper "Secure Limitation Analysis of Public-key Cryptography for Smart Card Settings" [38] focuses on a special case of smart card used in intelligent application systems with high security requirements. The authors first summarize the features of three main types of attacks in smart card security, including invasive attacks, semi-invasive attacks, and noninvasive attacks, and review the public key cryptography algorithms regarding security issues.…”
Section: Privacy and Security In Smart Computingmentioning
confidence: 99%
“…Theorem 1 (Shannon Channel Coding Theory): For discrete memoryless channels, all the bit rates smaller than channel capacity C are reachable, or it can be visually interpreted that all signals whose bit rates do not exceed channel capacity C can be transmitted from the sender to the receiver without error [4].…”
Section: B Relevant Basis Of Information Theorymentioning
confidence: 99%
“…In this paper, according to information theory, the attack and defense is regarded as the sender of communication, and an information receiver is constructed for them respectively, so we simulate the attack or defense process as a whole communication process. The successful transmission of 1 bit in the attack channel means that the attacker has successfully attacked once, and the successful transmission of 1 bit in the defense channel means that the defender has successfully defended once [3], [4]. Then, we describe the limitation of the capability of the attacking and defending sides by the channel capacity and analyze the effect of the change of k value on the capability of both attack and defense.…”
Section: Introductionmentioning
confidence: 99%
“…Related researchers have studied secure data deletion and obtained certain research findings. Xiong et al [19] introduced and analyzed related methods of secure data deletion based on cryptography [20].…”
Section: Introductionmentioning
confidence: 99%