메뉴 건너뛰기




Volumn 175, Issue , 2005, Pages 183-193

Threat modelling for security tokens in web applications

Author keywords

Security; Smart card applications; Threat modeling

Indexed keywords

SMART CARDS;

EID: 84870699962     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/11382324_14     Document Type: Conference Paper
Times cited : (12)

References (11)
  • 8
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • In, Lecture Notes in Computer Science 1109, N. Koblitz, Ed., Springer-Verlag
    • P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology-CRYPTO '96, pages 104-113, Lecture Notes in Computer Science 1109, N. Koblitz, Ed., Springer-Verlag, 1996.
    • (1996) Advances in Cryptology-CRYPTO '96 , pp. 104-113
    • Kocher, P.1
  • 9
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • In, Lecture Notes in Computer Science 1666, M. Wiener, Ed., Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Advances in Cryptology Conference-CRYPTO '99, pages 388-397, Lecture Notes in Computer Science 1666, M. Wiener, Ed., Springer-Verlag, 1999.
    • (1999) Advances in Cryptology Conference-CRYPTO '99 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 10
    • 3042641393 scopus 로고    scopus 로고
    • On the importance of eliminating errors in cryptographic computations
    • D. Boneh, R.A. DeMillo and R.J. Lipton. On the importance of eliminating errors in cryptographic computations, J. Cryptology, 14(2): 101-119, 2001.
    • (2001) J. Cryptology , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.