메뉴 건너뛰기




Volumn 3325, Issue , 2005, Pages 457-469

Evaluation and improvement of the Tempest Fonts

Author keywords

[No Author keywords available]

Indexed keywords

DATA HANDLING; ELECTRONIC CRIME COUNTERMEASURES; FOURIER TRANSFORMS;

EID: 23944439876     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31815-6_36     Document Type: Conference Paper
Times cited : (19)

References (13)
  • 1
    • 23944499474 scopus 로고    scopus 로고
    • Advances in side-channel cryptanalysis electromagnetic analysis and template attacks
    • Spring
    • D. Agrawal, B. Archambeault, S. Chari and J.R. Rao, Advances in Side-Channel Cryptanalysis Electromagnetic Analysis and Template Attacks, RSA Laboratories Cryptobytes, Vol. 6, No. 1,Spring 2003, pp.20-32.
    • (2003) RSA Laboratories Cryptobytes , vol.6 , Issue.1 , pp. 20-32
    • Agrawal, D.1    Archambeault, B.2    Chari, S.3    Rao, J.R.4
  • 2
    • 35248817849 scopus 로고    scopus 로고
    • The EM side channel(s)
    • Cryptographic Hardware and Embedded Systems (CHES 2002), Springer-Verlag
    • D. Agrawal, B. Archambeault, J.R. Rao and P. Rohatgi, The EM side channel(s), Cryptographic Hardware and Embedded Systems (CHES 2002), Lecture Notes in Computer Science, Vol. 2523, Springer-Verlag, 2002, pp.29-45.
    • (2002) Lecture Notes in Computer Science , vol.2523 , pp. 29-45
    • Agrawal, D.1    Archambeault, B.2    Rao, J.R.3    Rohatgi, P.4
  • 3
    • 35248899532 scopus 로고    scopus 로고
    • Tempest attacks
    • Cryptographic Hardware and Embedded Systems (CHES 2002), Springer-Verlag
    • S. Chari, J.R. Rao and P. Rohatgi, Tempest attacks, Cryptographic Hardware and Embedded Systems (CHES 2002), Lecture Notes in Computer Science, Vol. 2523, Springer-Verlag, 2002, pp. 13-28.
    • (2002) Lecture Notes in Computer Science , vol.2523 , pp. 13-28
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 4
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic analysis: Concrete results
    • Cryptographic Hardware and Embedded Systems (CHES 2001), Springer-Verlag
    • K. Gandolfi, C. Mourtel and F. Oliver, Electromagnetic analysis: Concrete results, Cryptographic Hardware and Embedded Systems (CHES 2001), Lecture Notes in Computer Science, Vol. 2162, Springer-Verlag, 2001, pp.251-261.
    • (2001) Lecture Notes in Computer Science , vol.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Oliver, F.3
  • 6
    • 56749102384 scopus 로고    scopus 로고
    • Electromagnetic eavesdropping risks of flat-panel displays
    • presented at the, 26-28 May
    • M. Kuhn, Electromagnetic Eavesdropping Risks of Flat-Panel Displays, presented at the 4th Workshop on Privacy Enhancing Technologies (PET2004), 26-28 May 2004. Presentation file is available at http://www.petworkshop.org/2004/ program.html
    • (2004) 4th Workshop on Privacy Enhancing Technologies (PET2004)
    • Kuhn, M.1
  • 8
    • 84859015303 scopus 로고    scopus 로고
    • Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
    • Information Hiding 1998 (IH'98), Springer-Verlag
    • M.G. Kuhn and R.J. Anderson, Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations, Information Hiding 1998 (IH'98), Lecture Notes in Computer Science, Vol. 1525, Springer-Verlag, 1998, pp. 124-142.
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 124-142
    • Kuhn, M.G.1    Anderson, R.J.2
  • 10
    • 78650238574 scopus 로고    scopus 로고
    • Electromagnetic analysis (EMA): Measures and countermeasures for smart cards
    • Smart cards programming and security (e-Smart 2001), Springer-Verlag
    • J-J. Quisquater and D. Samyde, Electromagnetic analysis (EMA): measures and countermeasures for smart cards, Smart cards programming and security (e-Smart 2001), Lecture Notes in Computer Science, Vol. 2140, Springer-Verlag, 2001, pp.200-210.
    • (2001) Lecture Notes in Computer Science , vol.2140 , pp. 200-210
    • Quisquater, J.-J.1    Samyde, D.2
  • 11
    • 0025383421 scopus 로고
    • The threat of information theft by reception of electromagnetic radiation from RS-232 cables
    • P. Smulders, The threat of information theft by reception of electromagnetic radiation from RS-232 cables, Computer and Security 9, 1990.
    • (1990) Computer and Security , vol.9
    • Smulders, P.1
  • 12
    • 33645408471 scopus 로고    scopus 로고
    • Video Electronics Standards Association http://www.vesa.org/
  • 13
    • 0022218742 scopus 로고
    • Electromagnetic radiation from video display units: An eavesdropping risk?
    • W. van Eck, Electromagnetic radiation from video display units: An eavesdropping risk?, Computers and Security 4, 1985.
    • (1985) Computers and Security , vol.4
    • Van Eck, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.