-
1
-
-
0242612471
-
Leakage-proof program partitioning
-
Grenoble, France, October
-
Tao Zhang, Santosh Pande, Andre Dos Santos, Franz-Josef Bruecklmayer, Leakage-Proof Program Partitioning. In Proceeding of International Conference on Compiler, Architecture and Synthesis for Embedded Systems (CASES 2002), pages 136-145, Grenoble, France, October 2002.
-
(2002)
Proceeding of International Conference on Compiler, Architecture and Synthesis for Embedded Systems (CASES 2002)
, pp. 136-145
-
-
Zhang, T.1
Pande, S.2
Dos Santos, A.3
Bruecklmayer, F.-J.4
-
2
-
-
23544433874
-
Study on multi-application smart card
-
Jason Tey, Study on Multi-Application Smart Card, http://web.singnet.com.sg/~jasontey/project.htm
-
-
-
Tey, J.1
-
3
-
-
84943632039
-
Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems
-
Springer-Verlag
-
P.C. Kocher, Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems, Proceedings Crypto'96, LNCS 1109, Springer-Verlag 1996, 104-113.
-
(1996)
Proceedings Crypto'96, LNCS 1109
, pp. 104-113
-
-
Kocher, P.C.1
-
5
-
-
1542322455
-
The SUIF 2 compiler documentation set
-
Stanford University; Sep.
-
Standard SUIF Compiler Infrastructure, The SUIF 2 compiler documentation set, Stanford University, Sep.2000. http://suif.stanford.edu/suif/index.html.
-
(2000)
-
-
-
6
-
-
84948770439
-
Mach-SUIF backend compiler, The Machine-SUIF 2.1 compiler documentation set
-
Harvard University, Sep.
-
Mach-SUIF Backend Compiler, The Machine-SUIF 2.1 compiler documentation set. Harvard University, Sep. 2000, http://ececs.harvard.edu/hube/research/machsuif.html.
-
(2000)
-
-
-
9
-
-
1542352602
-
-
http://wwww.arm.com/app.nsf/html/security?OpenDocument&style= ARM_Powered_Products
-
-
-
-
11
-
-
84949517809
-
Probing attacks on tamper-resistant devices
-
Springer-Verlag
-
H. Handschuh, P. Pallier, and J. Stern, Probing attacks on tamper-resistant devices, Proceedings of CHES '99, Lecture Notes in Computer Science, vol. 1717, Springer-Verlag, 1999, pp. 303-315.
-
(1999)
Proceedings of CHES '99, Lecture Notes in Computer Science
, vol.1717
, pp. 303-315
-
-
Handschuh, H.1
Pallier, P.2
Stern, J.3
-
14
-
-
84904650499
-
Investigations of power analysis attacks on smartcards
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Investigations of power analysis attacks on smartcards, Proceedings of USENIX Workshop on Smartcard Technology, 1999, pp. 151 161.
-
Proceedings of USENIX Workshop on Smartcard Technology, 1999
, pp. 151-161
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
15
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
(W. Fumy, ed.), Lecture Notes in Computer Science; Springer-Verlag
-
D. Boneh, R. A. DeMillo, and R. J. Lipton, On the importance of checking cryptographic protocols for faults, Proceedings of EUROCRYPT '97 (W. Fumy, ed.), Lecture Notes in Computer Science, vol. 1233, Springer-Verlag, 1997, pp. 37-51.
-
(1997)
Proceedings of EUROCRYPT '97
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
16
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Technical Report 148, Department of Computer Science, University of Auckland, July
-
Christian Collberg, Clark Thomborson, and Douglas Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
17
-
-
84955621400
-
Tamper resistant software: An implementation
-
R.J. Anderson, Editor, Springer, Verlag; Berlin
-
D. Aucsmith, Tamper Resistant Software: An Implementation, Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R.J. Anderson, Editor, Springer, Verlag, 1996, Berlin, pp.317-333.
-
(1996)
Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science)
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
|