Abstract is missing.
- User-Defined Divisibility of Ecash and a Practical ImplementationEli Biham, Amichai Shulman. 1-18
- An Operational Model of QuickPay - Extended AbstractPieter H. Hartel, Jake Hill, Matt Sims. 19-28
- Interoperable and Untraceable Debit-Tokens for Electronic Fee CollectionCristian Radu, Frederic Klopfert, Jan De Meester. 29-42
- The Banksys Signature Transport (BST) ProtocolMichel Dawirs, Joan Daemen. 43-51
- The OpenCard FrameworkReto Hermann, Dirk Husemann, Peter Trommler. 52-70
- Smartcards - From Security Tokens to Intelligent AdjunctsBoris Balacheff, Bruno Van Wilder, David Chan. 71-84
- Formal Proof of Smart Card Applets CorrectnessJean-Louis Lanet, Antoine Requet. 85-97
- Smart Card Payment over Internet with Privacy ProtectionPui-Nang Chan, Samuel T. Chanson, Ricci Ieong, James Pang. 98-104
- Developing Smart Card-Based Applications Using Java CardJean-Jacques Vandewalle, Eric Vétillard. 105-124
- The Performance of Modern Block Ciphers in JavaRüdiger Weis, Stefan Lucks. 125-133
- Recoverable Persistent Memory for SmartCardDidier Donsez, Gilles Grimaud, Sylvain Lecomte. 134-140
- Pirate Card RejectionDavid M. Goldschlag, David W. Kravitz. 141-149
- Secure Authentication with Multiple Parallel KeysJohn Kelsey, Bruce Schneier. 150-156
- Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy SignaturesMarc Girault. 157-166
- A Practical Implementation of the Timing AttackJean-François Dhem, François Koeune, Philippe-Alexandre Leroux, Patrick Mestré, Jean-Jacques Quisquater, Jean-Louis Willems. 167-182
- Techniques for Low Cost Authentication and Message AuthenticationHenri Gilbert. 183-192
- Enhancing SESAMEV4 with Smart CardsMark Looi, Paul Ashley, Loo Tang Seet, Richard Au, Gary Gaskell, Mark Vandenwauver. 193-202
- How to Say "YES" with Smart CardsYair Frankel, Moti Yung. 203-212
- An Efficient Verifiable Encryption Scheme for Encryption of Discrete LogarithmsFeng Bao. 213-220
- Efficient Smart-Card Based Anonymous FingerprintingJosep Domingo-Ferrer, Jordi Herrera-Joancomartí. 221-228
- Implementation of a Provably Secure, Smartcard-Based Key Distribution ProtocolRob Jerdonek, Peter Honeyman, Kevin Coffman, Jim Rees, Kip Wheeler. 229-235
- The Block Cipher BKSQJoan Daemen, Vincent Rijmen. 236-245
- Serpent and SmartcardsRoss J. Anderson, Eli Biham, Lars R. Knudsen. 246-253
- Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Card ApplicationsGuillaume Poupard, Serge Vaudenay. 254-264
- Twofish on Smart CardsBruce Schneier, Doug Whiting. 265-276
- The Block Cipher RijndaelJoan Daemen, Vincent Rijmen. 277-284
- Secure Log File Download Mechanisms for Smart CardsConstantinos Markantonakis. 285-304
- The Vault, an Architecture for Smartcards to Gain Infinite MemoryPatrick Biget. 305-312
- A Data Driven Model for Designing Applications with Smart CardsWilliam J. Caelli, Vincent Cordonnier, Anthony Watson. 313-325
- Secure Personalization Using Proxy CryptographyPierre Girard. 326-335
- Recent Results on Modular Multiplications for Smart CardsJean-François Dhem, Jean-Jacques Quisquater. 336-352
- RSA Signature Algorithm for Microcontroller ImplementationGuopei Qiao, Kwok-Yan Lam. 353-356
- Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart CardAlain Durand. 357-365
- Reducing the Collision Probability of Alleged Comp128Helena Handschuh, Pascal Paillier. 366-371
- Smart Card Crypto-Coprocessors for Public-Key CryptographyHelena Handschuh, Pascal Paillier. 372-379