Skip to main content

Security issues for contactless smart cards

  • Conference paper
  • First Online:
Public Key Cryptography (PKC 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1431))

Included in the following conference series:

Abstract

We review the current technologies of contactless smart cards and compare them with contact cards. We discuss the problems of implementing encryption in contactless cards, and consider how to solve the problems. We also report the state of standardization of contactless smart card.

This work was done while visiting in Columbia Univ., Computer Science Dept. from September 1997 for one year.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.ammismartcards.com

    Google Scholar 

  2. http://www.cardshow.com Smart Cards and Systems: Vol 2, Issues 30, 35, 36, 40

    Google Scholar 

  3. http://www.certicom.com

    Google Scholar 

  4. http://www.gemplus.com

    Google Scholar 

  5. L.C.Guillou, M.Ugon, and J.-J. Quisqater ”The smart card: A standardized security device dedicated to public cryptology,” in Contemporary Cryptography, edited by G.J.Simmons, IEEE Press.

    Google Scholar 

  6. N.Koblitz, “Elliptic Curve Cryptosystems,” Math.Comp. Vol.48 (1987).

    Google Scholar 

  7. V.S.Miller, “Use of Elliptic CURVES in Cryptography,” Proc. CRYPTO'95.

    Google Scholar 

  8. T.Matsumoto and H.Imai, “Public quadratic polynomial-tuples for efficient signature-verification and message-encryption” Proc. Eurocrypt88.

    Google Scholar 

  9. T.Matsumoto, H.Imai, C.S. Laih and S.M.Yen, “On verifiable implicit asking protocols for RSA computation,” Proc. ASIACRYPT'92.

    Google Scholar 

  10. The Web site at http: //www.multos.com

    Google Scholar 

  11. J.Patarin and L.Goubin, ”Trapddor one-way permutations and multivariate polynomials,” in Proc. ICICS97.

    Google Scholar 

  12. http://www.ramtron.com

    Google Scholar 

  13. R.Rivest, A.Shamir, and L.Adleman, “A method for obtaining digital signatures and public key cryptosystems,” CACM 21 (1978).

    Google Scholar 

  14. http://www.slb.com/ms/et

    Google Scholar 

  15. Y. Zheng, ”Signcryption and its applications in efficient public key solutions,” in Proc. Information Security Workshop'97.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hideki Imai Yuliang Zheng

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

David, M.W., Sakurai, K. (1998). Security issues for contactless smart cards. In: Imai, H., Zheng, Y. (eds) Public Key Cryptography. PKC 1998. Lecture Notes in Computer Science, vol 1431. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054029

Download citation

  • DOI: https://doi.org/10.1007/BFb0054029

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64693-8

  • Online ISBN: 978-3-540-69105-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics