메뉴 건너뛰기




Volumn 4462 LNCS, Issue , 2007, Pages 138-149

Reverse engineering Java card applets using power analysis

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SERVICES; PUBLIC KEY CRYPTOGRAPHY; REVERSE ENGINEERING; SECURITY OF DATA; SMART CARDS; ALGORITHMS; COMPUTATION THEORY; INTELLIGENT BUILDINGS; TRANSPORTATION; UBIQUITOUS COMPUTING;

EID: 37149045358     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72354-7_12     Document Type: Conference Paper
Times cited : (42)

References (11)
  • 1
    • 37149009432 scopus 로고    scopus 로고
    • Sun Microsystems, Inc
    • Sun Microsystems, Inc. http://www.sun.com/smi/Press/sunflash/2004-11/ sunflash.20041102.1.xml (2004)
    • (2004)
  • 2
    • 37149020060 scopus 로고    scopus 로고
    • Sun Microsystems, Inc
    • Sun Microsystems, Inc. http://www.sun.com/smi/Press/sunflash/2005-11/ sunflash.20051115.2.xml (2005)
    • (2005)
  • 3
    • 84939573910 scopus 로고    scopus 로고
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In Wiener, M.J., ed.: CRYPTO. 1666 of Lecture Notes in Computer Science., Springer (1999) 388-397
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In Wiener, M.J., ed.: CRYPTO. Volume 1666 of Lecture Notes in Computer Science., Springer (1999) 388-397
  • 4
    • 84943632039 scopus 로고    scopus 로고
    • Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In Koblitz, N., ed.: CRYPTO. 1109 of Lecture Notes in Computer Science., Springer (1996) 104-113
    • Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In Koblitz, N., ed.: CRYPTO. Volume 1109 of Lecture Notes in Computer Science., Springer (1996) 104-113
  • 5
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Computers 51(5) (2002) 541-552
    • (2002) IEEE Trans. Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 6
    • 1942521604 scopus 로고    scopus 로고
    • Advances in smartcard security
    • Also available at
    • Witteman, M.: Advances in smartcard security. Information Security Bulletin 7 (2002) 11-22 Also available at http ://www.riscure.com/articles/ ISB0707MW.pdf.
    • (2002) Information Security Bulletin , vol.7 , pp. 11-22
    • Witteman, M.1
  • 9
    • 37149048608 scopus 로고    scopus 로고
    • Witteman, M.: Java card security. Information Security Bulletin 8 (2003) 291-298 Also available at http://www.riscure.com/airticles/ISB0808MW.pdf.
    • Witteman, M.: Java card security. Information Security Bulletin 8 (2003) 291-298 Also available at http://www.riscure.com/airticles/ISB0808MW.pdf.
  • 11
    • 37149056185 scopus 로고    scopus 로고
    • Proebsting, T.A., Watterson, S.A.: Krakatoa: Decompilation in java (does bytecode reveal source?). In: COOTS, USENIX (1997) 185-198
    • Proebsting, T.A., Watterson, S.A.: Krakatoa: Decompilation in java (does bytecode reveal source?). In: COOTS, USENIX (1997) 185-198


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.