-
3
-
-
68349137024
-
-
APACS. 22 million UK consumers use cards to buy online in 2004; 08/09/05. http://www.apacs.org.uk/media_centre/press/05_09_08.html.
-
APACS. 22 million UK consumers use cards to buy online in 2004; 08/09/05. http://www.apacs.org.uk/media_centre/press/05_09_08.html.
-
-
-
-
4
-
-
31344443130
-
The sorcerer's apprentice guide to fault attacks
-
Bar-El H., Choukri H., Naccache D., Tunstall M., and Whelan C. The sorcerer's apprentice guide to fault attacks. Proc IEEE 94 2 (2006) 370-382
-
(2006)
Proc IEEE
, vol.94
, Issue.2
, pp. 370-382
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
5
-
-
68349134517
-
-
BBC Two Newsnight, Segment on vulnerabilities in Chip and PIN PIN entry devices (PEDs), http://video.google.com/videoplay?docid=7109740591622124830, 2/2008.
-
BBC Two "Newsnight", Segment on vulnerabilities in Chip and PIN "PIN entry devices" (PEDs), http://video.google.com/videoplay?docid=7109740591622124830, 2/2008.
-
-
-
-
6
-
-
84957355967
-
On the importance of checking computations
-
Proceedings of advances in cryptology, Springer-Verlag
-
Boneh D., DeMillo R.A., and Lipton R.J. On the importance of checking computations. Proceedings of advances in cryptology. LNCS vol. 1233 (1997), Springer-Verlag 37-51
-
(1997)
LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
7
-
-
35048818034
-
Correlation power analysis with a leakage model
-
Proceedings of cryptographic hardware and embedded systems, Springer-Verlag
-
Brier E., Clavier C., and Olivier F. Correlation power analysis with a leakage model. Proceedings of cryptographic hardware and embedded systems. LNCS vol. 3156 (2004), Springer-Verlag 16-29
-
(2004)
LNCS
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
8
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
Proceedings of cryptographic hardware and embedded system, Springer-Verlag
-
Clavier C., Coron J.S., and Dabbous N. Differential power analysis in the presence of hardware countermeasures. Proceedings of cryptographic hardware and embedded system. LNCS vol. 1965 (2000), Springer-Verlag 252-263
-
(2000)
LNCS
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.S.2
Dabbous, N.3
-
9
-
-
84957079591
-
Towards approaches to counteract power-analysis attacks
-
Proceedings of advances in cryptology, Springer-Verlag
-
Chari S., Jutla C.S., Rao J.R., and Rohatgi P. Towards approaches to counteract power-analysis attacks. Proceedings of advances in cryptology. LNCS vol. 1666 (1999), Springer-Verlag 398-412
-
(1999)
LNCS
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
10
-
-
68349145660
-
-
Card fraud facts and figures. http://www.apacs.org.uk/resources_publications/card_fraud_facts_and_figures.html.
-
Card fraud facts and figures
-
-
-
11
-
-
68349159975
-
-
Chip and SPIN !. http://www.chipandspin.co.uk/.
-
Chip and SPIN !. http://www.chipandspin.co.uk/.
-
-
-
-
15
-
-
68349127725
-
-
DSS Programming
-
DSS Programming. http://www.geocities.com/dssprogg/Guides/hunewbie.html.
-
-
-
-
17
-
-
0005239393
-
Digital Video Broadcasting (DVB); support for use of scrambling and conditional access (CA) within digital broadcasting systems
-
ETSI, European Telecommunications Standards Institute ETSI, Sophia Antipolis, France; Oct
-
ETSI. Digital Video Broadcasting (DVB); support for use of scrambling and conditional access (CA) within digital broadcasting systems. ETSI Technical Report ETR 289, European Telecommunications Standards Institute (ETSI), Sophia Antipolis, France; Oct. 1996.
-
(1996)
ETSI Technical Report ETR
, vol.289
-
-
-
18
-
-
68349126471
-
-
ECM attacks, many dish network cards are now DEAD!. http://www.freetvblog.com/archives/2006/12/14/many-bell-express-vu-and-dish-network-cards-are-now-dead/.
-
ECM attacks, many dish network cards are now DEAD!. http://www.freetvblog.com/archives/2006/12/14/many-bell-express-vu-and-dish-network-cards-are-now-dead/.
-
-
-
-
19
-
-
68349149992
-
-
Europay-MasterCard-Visa. EMV'96 integrated circuit card specification for payment systems, Version 3.0, from: http://www.europay.com/Pdf/EMV_card.pdf.
-
Europay-MasterCard-Visa. EMV'96 integrated circuit card specification for payment systems, Version 3.0, from: http://www.europay.com/Pdf/EMV_card.pdf.
-
-
-
-
20
-
-
35248862449
-
Electromagnetic analysis: concrete results
-
Proceedings of cryptographic hardware and embedded systems, Springer-Verlag
-
Gandolfi K., Mourtel C., and Olivier F. Electromagnetic analysis: concrete results. Proceedings of cryptographic hardware and embedded systems. LNCS vol. 2162 (2001), Springer-Verlag 251-261
-
(2001)
LNCS
, vol.2162
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
22
-
-
68349124625
-
-
International Organization for Standardization. ISO/IEC 15693 Identification cards - contactless integrated circuit(s) cards - vicinity cards; 2000a.
-
International Organization for Standardization. ISO/IEC 15693 Identification cards - contactless integrated circuit(s) cards - vicinity cards; 2000a.
-
-
-
-
23
-
-
68349130824
-
-
International Organization for Standardization. ISO/IEC 14443 Identification cards - contactless integrated circuit(s) cards - proximity cards; 2000b.
-
International Organization for Standardization. ISO/IEC 14443 Identification cards - contactless integrated circuit(s) cards - proximity cards; 2000b.
-
-
-
-
24
-
-
68349134516
-
-
Irdeto. http://www.irdetoaccess.com.
-
Irdeto
-
-
-
25
-
-
0003873108
-
Information technology - generic coding of moving pictures and associated audio: Audio. In: International Standard
-
ISO/IEC, ISO/IEC 13818-3, International Organization for Standardization ISO, Geneva, Switzerland;
-
ISO/IEC. Information technology - generic coding of moving pictures and associated audio: audio. In: International Standard ISO/IEC 13818-3, International Organization for Standardization (ISO), Geneva, Switzerland; 1994.
-
(1994)
-
-
-
26
-
-
0003873108
-
Information technology - generic coding of moving pictures and associated audio: Video. In: International Standard
-
ISO/IEC, ISO/IEC 13818-2, International Organization for Standardization ISO, Geneva, Switzerland
-
ISO/IEC. Information technology - generic coding of moving pictures and associated audio: video. In: International Standard ISO/IEC 13818-2, International Organization for Standardization (ISO), Geneva, Switzerland, 1995.
-
(1995)
-
-
-
27
-
-
33751051321
-
Information technology - telecommunications and information exchange between systems - near field communication - interface and protocol
-
ISO/IEC 18092, NFCIP-1
-
ISO/IEC 18092. Information technology - telecommunications and information exchange between systems - near field communication - interface and protocol (NFCIP-1).
-
-
-
-
29
-
-
33847269759
-
Picking virtual pockets using relay attacks on contactless smartcard systems
-
Kfir Z, Wool A. Picking virtual pockets using relay attacks on contactless smartcard systems. In: Proceedings of IEEE/CreateNet SecureComm; 2005, pp. 47-58.
-
(2005)
Proceedings of IEEE/CreateNet SecureComm
, pp. 47-58
-
-
Kfir, Z.1
Wool, A.2
-
31
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Proceedings of advances in cryptology, Springer-Verlag
-
Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Proceedings of advances in cryptology. LNCS vol. 1109 (1996), Springer-Verlag 104-113
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
32
-
-
84939573910
-
Differential power analysis
-
Proceedings of advances in cryptology, Springer-Verlag
-
Kocher P., Jaffe J., and Jun B. Differential power analysis. Proceedings of advances in cryptology. LNCS vol. 1666 (1999), Springer-Verlag 388-397
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
33
-
-
68349136313
-
-
Kuhn MG. Attacks on pay-TV access control systems. University of Cambridge, Computer Laboratory, Security Seminar talk, 1997-12-09.
-
Kuhn MG. Attacks on pay-TV access control systems. University of Cambridge, Computer Laboratory, Security Seminar talk, 1997-12-09.
-
-
-
-
35
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
Proceedings of cryptographic hardware and embedded systems, Springer-Verlag
-
Messerges T.S. Using second-order power analysis to attack DPA resistant software. Proceedings of cryptographic hardware and embedded systems. LNCS vol. 1965 (2000), Springer-Verlag 71-77
-
(2000)
LNCS
, vol.1965
, pp. 71-77
-
-
Messerges, T.S.1
-
36
-
-
68349127724
-
-
MIFARE
-
MIFARE, http://www.mifare.net.
-
-
-
-
39
-
-
79958857295
-
-
Oyster Card, http://www.tfl.gov.uk/tube/.
-
Oyster Card
-
-
-
40
-
-
84868307291
-
-
Octopus Card, http://www.hong-kong-travel.org/Octopus.asp.
-
Octopus Card
-
-
-
41
-
-
68349138860
-
-
OpenPCD Project
-
OpenPCD Project. http://www.openpcd.org.
-
-
-
-
42
-
-
78650238574
-
Electromagnetic analysis (EMA): measures and countermeasures for smart cards
-
Proceedings of smart card programming and security, international conference on research in smart cards, Springer-Verlag
-
Quisquater J.J., and Samyde D. Electromagnetic analysis (EMA): measures and countermeasures for smart cards. Proceedings of smart card programming and security, international conference on research in smart cards. LNCS vol. 2140 (2001), Springer-Verlag 200-210
-
(2001)
LNCS
, vol.2140
, pp. 200-210
-
-
Quisquater, J.J.1
Samyde, D.2
-
44
-
-
35248813476
-
Optical fault induction attacks
-
Proceedings of cryptographic hardware and embedded systems, Springer-Verlag
-
Skorobogatov S., and Anderson R. Optical fault induction attacks. Proceedings of cryptographic hardware and embedded systems. LNCS vol. 2523 (2002), Springer-Verlag 2-12
-
(2002)
LNCS
, vol.2523
, pp. 2-12
-
-
Skorobogatov, S.1
Anderson, R.2
-
45
-
-
68349124626
-
-
Season Interface Logger. http://www.satshop.tv/en/Programmers/Season-Interface-Logger::456.html.
-
Season Interface Logger
-
-
-
46
-
-
68349143812
-
-
The Official PCMCIA Association
-
The Official PCMCIA Association. Website: http://www.pcmcia.org/.
-
Website
-
-
-
47
-
-
33845302672
-
Inhibiting card sharing attacks
-
Proceedings of advances in information security and computer science, Springer-Verlag
-
Tunstall M., Markantonakis K., and Mayes K. Inhibiting card sharing attacks. Proceedings of advances in information security and computer science. LNCS vol. 4266 (2006), Springer-Verlag 239-251
-
(2006)
LNCS
, vol.4266
, pp. 239-251
-
-
Tunstall, M.1
Markantonakis, K.2
Mayes, K.3
-
48
-
-
68349147460
-
-
VIAccess http://www.viaccess.com.
-
VIAccess
-
-
-
50
-
-
68349134514
-
-
Verified by Visa
-
Visa Europe. Verified by Visa. http://www.visaeurope.com/merchant/handlingvisapayments/cardnotpresent/verifiedbyvisa.jsp.
-
Visa Europe
-
-
|