-
2
-
-
84957018842
-
-
-, Low Cost Attacks on Tamper Resistant Devices, in Security Protocols, 5th International Workshop, ser. Lecture Notes in Computer Science, M. L. et al. Ed., 1361. Springer, 1997, pp. 125-136.
-
-, "Low Cost Attacks on Tamper Resistant Devices," in Security Protocols, 5th International Workshop, ser. Lecture Notes in Computer Science, M. L. et al. Ed., vol. 1361. Springer, 1997, pp. 125-136.
-
-
-
-
3
-
-
84957355967
-
-
D. Boneh, R. A. DeMillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract), in Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceedings, ser. Lecture Notes in Computer Science, W. Fumy, Ed., 1233. Springer, 1997, pp. 37-51.
-
D. Boneh, R. A. DeMillo, and R. J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)," in Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceedings, ser. Lecture Notes in Computer Science, W. Fumy, Ed., vol. 1233. Springer, 1997, pp. 37-51.
-
-
-
-
4
-
-
84958641478
-
-
E. Biham and A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, in Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, ser. Lecture Notes in Computer Science, B. S. K. Jr., Ed., 1294. Springer, 1997, pp. 513-525.
-
E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," in Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, ser. Lecture Notes in Computer Science, B. S. K. Jr., Ed., vol. 1294. Springer, 1997, pp. 513-525.
-
-
-
-
5
-
-
84939573910
-
-
P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, in Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, ser. Lecture Notes in Computer Science, M. Wiener, Ed., 1666. Springer, 1999, pp. 388-397.
-
P. C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," in Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, ser. Lecture Notes in Computer Science, M. Wiener, Ed., vol. 1666. Springer, 1999, pp. 388-397.
-
-
-
-
6
-
-
84904650499
-
Investigations of Power Analysis Attacks on Smartcards
-
May
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Investigations of Power Analysis Attacks on Smartcards," in USENIX Workshop on Smartcard Technology (Smartcard '99), May 1999, pp. 151-162.
-
(1999)
USENIX Workshop on Smartcard Technology (Smartcard '99)
, pp. 151-162
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
7
-
-
71249088698
-
-
Y. Oren and A. Shamir, Remote Power Analysis of RFID Tags, Master's thesis, Weizmann Institute of Science, Rehovot, Israel, August 2006, further information on http://www.wisdom.weizmann.ac.il/~yossio/rfid/. [Online]. Available: http://eprint.iacr.org/2007/330.pdf
-
Y. Oren and A. Shamir, "Remote Power Analysis of RFID Tags," Master's thesis, Weizmann Institute of Science, Rehovot, Israel, August 2006, further information on http://www.wisdom.weizmann.ac.il/~yossio/rfid/. [Online]. Available: http://eprint.iacr.org/2007/330.pdf
-
-
-
-
8
-
-
43349097152
-
-
T. Plos, Susceptibility of UHF RFID Tags to Electromagnetic Analysis, in Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Proceedings, ser. Lecture Notes in Computer Science, T. Malkin, Ed., 4964. Springer, April 2008, pp. 288-300. [Online]. Available: http://www.springerlink.com/content/l5n71111404317t6/fulltext.pdf
-
T. Plos, "Susceptibility of UHF RFID Tags to Electromagnetic Analysis," in Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Proceedings, ser. Lecture Notes in Computer Science, T. Malkin, Ed., vol. 4964. Springer, April 2008, pp. 288-300. [Online]. Available: http://www.springerlink.com/content/l5n71111404317t6/fulltext.pdf
-
-
-
-
9
-
-
38049074796
-
-
M. Hutter, S. Mangard, and M. Feldhofer, Power and EM Attacks on Passive 13.56 MHz RFID Devices, in Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, ser. Lecture Notes in Computer Science, P. Paillier and I. Verbauwhede, Eds., 4727. Springer, September 2007, pp. 320-333. [Online]. Available: http://www.springerlink.com/content/ n27q456qhr34818k/fulltext.pdf
-
M. Hutter, S. Mangard, and M. Feldhofer, "Power and EM Attacks on Passive 13.56 MHz RFID Devices," in Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, ser. Lecture Notes in Computer Science, P. Paillier and I. Verbauwhede, Eds., vol. 4727. Springer, September 2007, pp. 320-333. [Online]. Available: http://www.springerlink.com/content/ n27q456qhr34818k/fulltext.pdf
-
-
-
-
10
-
-
51049096802
-
-
M. Hutter, J.-M. Schmidt, and T. Plos, RFID and its Vulnerability to Faults, in Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington DC, USA, August 10-13, 2008, Proceedings, ser. Lecture Notes in Computer Science, E. Oswald and P. Rohatgi, Eds., 5154. Springer, August 2008, pp. 363-379. [Online]. Available: http: //www.springerlink.com/content/rm23vg1071355423/
-
M. Hutter, J.-M. Schmidt, and T. Plos, "RFID and its Vulnerability to Faults," in Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington DC, USA, August 10-13, 2008, Proceedings, ser. Lecture Notes in Computer Science, E. Oswald and P. Rohatgi, Eds., vol. 5154. Springer, August 2008, pp. 363-379. [Online]. Available: http: //www.springerlink.com/content/rm23vg1071355423/
-
-
-
-
11
-
-
84890863577
-
-
S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, 2007, iSBN 978-0-387-30857-9. [Online]. Available: http://www.dpabook.org
-
S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, 2007, iSBN 978-0-387-30857-9. [Online]. Available: http://www.dpabook.org
-
-
-
|