1996
DOI: 10.1109/40.502402
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0
1

Year Published

1997
1997
2018
2018

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(34 citation statements)
references
References 8 publications
0
33
0
1
Order By: Relevance
“…Read local variable at index %o2 (6) ldub [PC + 3], %o2 ! Read ISTORE index operand (7) sll %o2, 2, %o2 (8) neg %o2 (9) st %l3, [LOCALS + %o2] ! Store value in local variable at index %o2 (10) sll TARGET, SDISP, TARGET !…”
Section: Introductionunclassified
See 2 more Smart Citations
“…Read local variable at index %o2 (6) ldub [PC + 3], %o2 ! Read ISTORE index operand (7) sll %o2, 2, %o2 (8) neg %o2 (9) st %l3, [LOCALS + %o2] ! Store value in local variable at index %o2 (10) sll TARGET, SDISP, TARGET !…”
Section: Introductionunclassified
“…Calculating address of next bytecode (19) jmp ORIGIN + TARGET (20) add PC, 2, PC ! Updating PC, delay slot sll %o2, 2, %o2 (8) neg %o2 (9) st %l3, [LOCALS + %o2] ! Store value in local variable at index %o2 (10) sll TARGET, SDISP, TARGET !…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This proxy can be a smart card that can perform public key encryption internally [22] [23]. For example, the CAFE project [17] and the Mondex system [24] use the smart card technology for off-line transactions.…”
Section: Off-line Operationsmentioning
confidence: 99%
“…Beyond any doubt, cryptographic algorithms will be embedded in almost any application involving exchanging of information. Applications, such as smart cards [11] and hand-held devices require hardware designs restricted on area and power resources.…”
Section: Introductionmentioning
confidence: 99%