%PDF-1.4 % 8 0 obj << /S /GoTo /D (Outline0.1) >> endobj 11 0 obj (Introduction) endobj 12 0 obj << /S /GoTo /D (Outline0.1.1.2) >> endobj 15 0 obj (Physical attacks) endobj 16 0 obj << /S /GoTo /D (Outline0.1.2.6) >> endobj 19 0 obj (Authentication for smart card) endobj 20 0 obj << /S /GoTo /D (Outline0.2) >> endobj 23 0 obj (Background) endobj 24 0 obj << /S /GoTo /D (Outline0.2.1.20) >> endobj 27 0 obj (Smart Card Development Process) endobj 28 0 obj << /S /GoTo /D (Outline0.2.2.32) >> endobj 31 0 obj (Attack hypothesis) endobj 32 0 obj << /S /GoTo /D (Outline0.3) >> endobj 35 0 obj (Towards a high level model of attacks) endobj 36 0 obj << /S /GoTo /D (Outline0.3.1.35) >> endobj 39 0 obj (Studying low level attacks consequences) endobj 40 0 obj << /S /GoTo /D (Outline0.3.2.43) >> endobj 43 0 obj (Flow shifting) endobj 44 0 obj << /S /GoTo /D (Outline0.3.3.47) >> endobj 47 0 obj (Assembly attack analysis) endobj 48 0 obj << /S /GoTo /D (Outline0.3.4.53) >> endobj 51 0 obj (Jump attack model) endobj 52 0 obj << /S /GoTo /D (Outline0.4) >> endobj 55 0 obj (Using the model) endobj 56 0 obj << /S /GoTo /D (Outline0.4.1.55) >> endobj 59 0 obj (Experimental setup) endobj 60 0 obj << /S /GoTo /D (Outline0.4.2.59) >> endobj 63 0 obj (Experimental results) endobj 64 0 obj << /S /GoTo /D (Outline0.4.3.65) >> endobj 67 0 obj (Results on smart card codes) endobj 68 0 obj << /S /GoTo /D (Outline0.4.4.66) >> endobj 71 0 obj (Conclusion) endobj 72 0 obj << /S /GoTo /D [73 0 R /Fit ] >> endobj 112 0 obj << /Length 1767 /Filter /FlateDecode >> stream xYYs7~ׯj&}1MڇViY˶Ku4Ϳ/sWZ;3 ~ p)"`d0yc"qM3r9:=zXI⏓d}E(gߪnmI6QЁ8F`00fHݒ; $" ؆kGg(#A801H
lW;)%Wk4>SE!A]H`\˴՜mRK-WX*ʔTR$
i6i3AG%ar
=Ҽ(%L*LiuS;g&%|TC-,%>@xL