-
1
-
-
68549085149
-
-
Identification cards - Integrated circuit cards, ISO/IEC 7816.
-
Identification cards - Integrated circuit cards, ISO/IEC 7816.
-
-
-
-
2
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Advances in cryptology, proceedings of EUROCRYPT'97
-
Boneh D, Demillo RA, Lipton RJ. On the importance of checking cryptographic protocols for faults. In: Advances in cryptology, proceedings of EUROCRYPT'97. Lecture notes in computer science, vol. 1233; 1997.
-
(1997)
Lecture notes in computer science
, vol.1233
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
3
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
Advances in cryptology, proceedings of CRYPTO'97, Springer-Verlag
-
Biham E., and Shamir A. Differential fault analysis of secret key cryptosystems. Advances in cryptology, proceedings of CRYPTO'97. Lecture notes in computer science vol. 1294 (1997), Springer-Verlag
-
(1997)
Lecture notes in computer science
, vol.1294
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
68549112781
-
-
Common criteria for information technology security evaluation, v2.3 comprising parts 1-3
-
Common criteria for information technology security evaluation, v2.3 (comprising parts 1-3).
-
-
-
-
5
-
-
68549109437
-
-
Common criteria for information technology security evaluation, v3.1 comprising parts 1-3
-
Common criteria for information technology security evaluation, v3.1 (comprising parts 1-3).
-
-
-
-
6
-
-
68549097878
-
-
Common methodology for information technology security evaluation: evaluation methodology, v2.3, CCIMB-2005-08-004, August 2005.
-
Common methodology for information technology security evaluation: evaluation methodology, v2.3, CCIMB-2005-08-004, August 2005.
-
-
-
-
7
-
-
68549088769
-
-
Common methodology for information technology security evaluation: evaluation methodology, v3.1, CCMB-2007-09-004 Release 2, September 2007.
-
Common methodology for information technology security evaluation: evaluation methodology, v3.1, CCMB-2007-09-004 Release 2, September 2007.
-
-
-
-
8
-
-
68549120764
-
-
A complete guide to the common vulnerability scoring system Version 2.0, June 2007, http://www.first.org/cvss/cvss-guide.pdf.
-
A complete guide to the common vulnerability scoring system Version 2.0, June 2007, http://www.first.org/cvss/cvss-guide.pdf.
-
-
-
-
9
-
-
68549086940
-
-
see global platform specifications at
-
see global platform specifications at www.globalplatform.org.
-
-
-
-
11
-
-
84939573910
-
Differential power analysis
-
Advances in cryptology, proceedings of CRYPTO'99, Springer-Verlag
-
Kocher P., Jaffe J., and Jun B. Differential power analysis. Advances in cryptology, proceedings of CRYPTO'99. Lecture notes in computer science vol. 1666 (1999), Springer-Verlag
-
(1999)
Lecture notes in computer science
, vol.1666
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
12
-
-
84949514743
-
Power analysis attacks of modular exponentiation in smartcards
-
Proceedings of CHES '99, Springer-Verlag
-
Messerges T.S., Dabbish E.A., and Sloan R.H. Power analysis attacks of modular exponentiation in smartcards. Proceedings of CHES '99. Lecture notes in computer science vol. 1717 (1999), Springer-Verlag
-
(1999)
Lecture notes in computer science
, vol.1717
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
13
-
-
68549104082
-
-
Novak R. Side-channel based reverse engineering of secret algorithms. In: Proceedings of the 12th international electrotechnical and computer science conference - ERK 2003.
-
Novak R. Side-channel based reverse engineering of secret algorithms. In: Proceedings of the 12th international electrotechnical and computer science conference - ERK 2003.
-
-
-
-
14
-
-
68549096025
-
-
Application of attack potential to smartcards, v2.5 Revision 1, April 2008, CCDB-2008-04-001.
-
Application of attack potential to smartcards, v2.5 Revision 1, April 2008, CCDB-2008-04-001.
-
-
-
-
15
-
-
37149045358
-
Reverse engineering Java card applets using power analysis
-
Workshop in information security theory and practices 2007, Springer-Verlag
-
Vermoen D., Witteman M., and Gaydadjiev G.N. Reverse engineering Java card applets using power analysis. Workshop in information security theory and practices 2007. Lecture notes in computer science vol. 4462 (2007), Springer-Verlag
-
(2007)
Lecture notes in computer science
, vol.4462
-
-
Vermoen, D.1
Witteman, M.2
Gaydadjiev, G.N.3
|