메뉴 건너뛰기




Volumn , Issue , 2009, Pages 409-412

Contact-based fault injections and power analysis on RFID tags

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC DEVICES; FAULT INJECTION; INJECTION METHOD; MEASUREMENT SETUP; PASSIVE RFID; POWER ANALYSIS; POWER ANALYSIS ATTACK; POWER CONSUMPTION; POWER SUPPLY; POWERED DEVICES; RADIOFREQUENCY IDENTIFICATION TAGS; RF-ID TAGS; SECRET KEY; UHF RFID;

EID: 71249139840     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECCTD.2009.5275012     Document Type: Conference Paper
Times cited : (26)

References (11)
  • 2
    • 84957018842 scopus 로고    scopus 로고
    • -, Low Cost Attacks on Tamper Resistant Devices, in Security Protocols, 5th International Workshop, ser. Lecture Notes in Computer Science, M. L. et al. Ed., 1361. Springer, 1997, pp. 125-136.
    • -, "Low Cost Attacks on Tamper Resistant Devices," in Security Protocols, 5th International Workshop, ser. Lecture Notes in Computer Science, M. L. et al. Ed., vol. 1361. Springer, 1997, pp. 125-136.
  • 3
    • 84957355967 scopus 로고    scopus 로고
    • D. Boneh, R. A. DeMillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract), in Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceedings, ser. Lecture Notes in Computer Science, W. Fumy, Ed., 1233. Springer, 1997, pp. 37-51.
    • D. Boneh, R. A. DeMillo, and R. J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)," in Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceedings, ser. Lecture Notes in Computer Science, W. Fumy, Ed., vol. 1233. Springer, 1997, pp. 37-51.
  • 4
    • 84958641478 scopus 로고    scopus 로고
    • E. Biham and A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, in Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, ser. Lecture Notes in Computer Science, B. S. K. Jr., Ed., 1294. Springer, 1997, pp. 513-525.
    • E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," in Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, ser. Lecture Notes in Computer Science, B. S. K. Jr., Ed., vol. 1294. Springer, 1997, pp. 513-525.
  • 5
    • 84939573910 scopus 로고    scopus 로고
    • P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, in Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, ser. Lecture Notes in Computer Science, M. Wiener, Ed., 1666. Springer, 1999, pp. 388-397.
    • P. C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," in Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, ser. Lecture Notes in Computer Science, M. Wiener, Ed., vol. 1666. Springer, 1999, pp. 388-397.
  • 7
    • 71249088698 scopus 로고    scopus 로고
    • Y. Oren and A. Shamir, Remote Power Analysis of RFID Tags, Master's thesis, Weizmann Institute of Science, Rehovot, Israel, August 2006, further information on http://www.wisdom.weizmann.ac.il/~yossio/rfid/. [Online]. Available: http://eprint.iacr.org/2007/330.pdf
    • Y. Oren and A. Shamir, "Remote Power Analysis of RFID Tags," Master's thesis, Weizmann Institute of Science, Rehovot, Israel, August 2006, further information on http://www.wisdom.weizmann.ac.il/~yossio/rfid/. [Online]. Available: http://eprint.iacr.org/2007/330.pdf
  • 8
    • 43349097152 scopus 로고    scopus 로고
    • T. Plos, Susceptibility of UHF RFID Tags to Electromagnetic Analysis, in Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Proceedings, ser. Lecture Notes in Computer Science, T. Malkin, Ed., 4964. Springer, April 2008, pp. 288-300. [Online]. Available: http://www.springerlink.com/content/l5n71111404317t6/fulltext.pdf
    • T. Plos, "Susceptibility of UHF RFID Tags to Electromagnetic Analysis," in Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Proceedings, ser. Lecture Notes in Computer Science, T. Malkin, Ed., vol. 4964. Springer, April 2008, pp. 288-300. [Online]. Available: http://www.springerlink.com/content/l5n71111404317t6/fulltext.pdf
  • 9
    • 38049074796 scopus 로고    scopus 로고
    • M. Hutter, S. Mangard, and M. Feldhofer, Power and EM Attacks on Passive 13.56 MHz RFID Devices, in Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, ser. Lecture Notes in Computer Science, P. Paillier and I. Verbauwhede, Eds., 4727. Springer, September 2007, pp. 320-333. [Online]. Available: http://www.springerlink.com/content/ n27q456qhr34818k/fulltext.pdf
    • M. Hutter, S. Mangard, and M. Feldhofer, "Power and EM Attacks on Passive 13.56 MHz RFID Devices," in Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, ser. Lecture Notes in Computer Science, P. Paillier and I. Verbauwhede, Eds., vol. 4727. Springer, September 2007, pp. 320-333. [Online]. Available: http://www.springerlink.com/content/ n27q456qhr34818k/fulltext.pdf
  • 10
    • 51049096802 scopus 로고    scopus 로고
    • M. Hutter, J.-M. Schmidt, and T. Plos, RFID and its Vulnerability to Faults, in Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington DC, USA, August 10-13, 2008, Proceedings, ser. Lecture Notes in Computer Science, E. Oswald and P. Rohatgi, Eds., 5154. Springer, August 2008, pp. 363-379. [Online]. Available: http: //www.springerlink.com/content/rm23vg1071355423/
    • M. Hutter, J.-M. Schmidt, and T. Plos, "RFID and its Vulnerability to Faults," in Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington DC, USA, August 10-13, 2008, Proceedings, ser. Lecture Notes in Computer Science, E. Oswald and P. Rohatgi, Eds., vol. 5154. Springer, August 2008, pp. 363-379. [Online]. Available: http: //www.springerlink.com/content/rm23vg1071355423/
  • 11
    • 84890863577 scopus 로고    scopus 로고
    • S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, 2007, iSBN 978-0-387-30857-9. [Online]. Available: http://www.dpabook.org
    • S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, 2007, iSBN 978-0-387-30857-9. [Online]. Available: http://www.dpabook.org


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.