메뉴 건너뛰기




Volumn 14, Issue 2, 2009, Pages 57-69

Smart card security evaluation: Community solutions to intractable problems

Author keywords

[No Author keywords available]

Indexed keywords

COMMON CRITERIA; EVALUATION RESULTS; HARDWARE AND SOFTWARE; INTERNATIONAL MUTUAL RECOGNITION; ISO 15408; PARAMETER SPACES; SMART CARD SECURITY;

EID: 68549110346     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2009.06.002     Document Type: Article
Times cited : (3)

References (15)
  • 1
    • 68549085149 scopus 로고    scopus 로고
    • Identification cards - Integrated circuit cards, ISO/IEC 7816.
    • Identification cards - Integrated circuit cards, ISO/IEC 7816.
  • 2
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Advances in cryptology, proceedings of EUROCRYPT'97
    • Boneh D, Demillo RA, Lipton RJ. On the importance of checking cryptographic protocols for faults. In: Advances in cryptology, proceedings of EUROCRYPT'97. Lecture notes in computer science, vol. 1233; 1997.
    • (1997) Lecture notes in computer science , vol.1233
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 3
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • Advances in cryptology, proceedings of CRYPTO'97, Springer-Verlag
    • Biham E., and Shamir A. Differential fault analysis of secret key cryptosystems. Advances in cryptology, proceedings of CRYPTO'97. Lecture notes in computer science vol. 1294 (1997), Springer-Verlag
    • (1997) Lecture notes in computer science , vol.1294
    • Biham, E.1    Shamir, A.2
  • 4
    • 68549112781 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation, v2.3 comprising parts 1-3
    • Common criteria for information technology security evaluation, v2.3 (comprising parts 1-3).
  • 5
    • 68549109437 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation, v3.1 comprising parts 1-3
    • Common criteria for information technology security evaluation, v3.1 (comprising parts 1-3).
  • 6
    • 68549097878 scopus 로고    scopus 로고
    • Common methodology for information technology security evaluation: evaluation methodology, v2.3, CCIMB-2005-08-004, August 2005.
    • Common methodology for information technology security evaluation: evaluation methodology, v2.3, CCIMB-2005-08-004, August 2005.
  • 7
    • 68549088769 scopus 로고    scopus 로고
    • Common methodology for information technology security evaluation: evaluation methodology, v3.1, CCMB-2007-09-004 Release 2, September 2007.
    • Common methodology for information technology security evaluation: evaluation methodology, v3.1, CCMB-2007-09-004 Release 2, September 2007.
  • 8
    • 68549120764 scopus 로고    scopus 로고
    • A complete guide to the common vulnerability scoring system Version 2.0, June 2007, http://www.first.org/cvss/cvss-guide.pdf.
    • A complete guide to the common vulnerability scoring system Version 2.0, June 2007, http://www.first.org/cvss/cvss-guide.pdf.
  • 9
    • 68549086940 scopus 로고    scopus 로고
    • see global platform specifications at
    • see global platform specifications at www.globalplatform.org.
  • 11
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Advances in cryptology, proceedings of CRYPTO'99, Springer-Verlag
    • Kocher P., Jaffe J., and Jun B. Differential power analysis. Advances in cryptology, proceedings of CRYPTO'99. Lecture notes in computer science vol. 1666 (1999), Springer-Verlag
    • (1999) Lecture notes in computer science , vol.1666
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 12
    • 84949514743 scopus 로고    scopus 로고
    • Power analysis attacks of modular exponentiation in smartcards
    • Proceedings of CHES '99, Springer-Verlag
    • Messerges T.S., Dabbish E.A., and Sloan R.H. Power analysis attacks of modular exponentiation in smartcards. Proceedings of CHES '99. Lecture notes in computer science vol. 1717 (1999), Springer-Verlag
    • (1999) Lecture notes in computer science , vol.1717
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 13
    • 68549104082 scopus 로고    scopus 로고
    • Novak R. Side-channel based reverse engineering of secret algorithms. In: Proceedings of the 12th international electrotechnical and computer science conference - ERK 2003.
    • Novak R. Side-channel based reverse engineering of secret algorithms. In: Proceedings of the 12th international electrotechnical and computer science conference - ERK 2003.
  • 14
    • 68549096025 scopus 로고    scopus 로고
    • Application of attack potential to smartcards, v2.5 Revision 1, April 2008, CCDB-2008-04-001.
    • Application of attack potential to smartcards, v2.5 Revision 1, April 2008, CCDB-2008-04-001.
  • 15
    • 37149045358 scopus 로고    scopus 로고
    • Reverse engineering Java card applets using power analysis
    • Workshop in information security theory and practices 2007, Springer-Verlag
    • Vermoen D., Witteman M., and Gaydadjiev G.N. Reverse engineering Java card applets using power analysis. Workshop in information security theory and practices 2007. Lecture notes in computer science vol. 4462 (2007), Springer-Verlag
    • (2007) Lecture notes in computer science , vol.4462
    • Vermoen, D.1    Witteman, M.2    Gaydadjiev, G.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.