메뉴 건너뛰기




Volumn , Issue , 2008, Pages 195-228

Smart card security

Author keywords

Embedded Software; Fault Analysis; Side Channel Analysis; Smart Card Security

Indexed keywords


EID: 84887951080     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-72198-9_9     Document Type: Chapter
Times cited : (4)

References (46)
  • 1
    • 84943615552 scopus 로고    scopus 로고
    • An implementation of des and aes secure against some attacks
    • In Koc, C. K., Naccache, D., and Paar, C., editors Springer-Verlag.
    • Akkar, M.-L. and Giraud, C. (2001). An implementation of DES and AES secure against some attacks. In Koc, C. K., Naccache, D., and Paar, C., editors, Cryptogaphic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 309-318. Springer-Verlag.
    • (2001) Cryptogaphic Hardware and Embedded Systems - CHES 2001,of Lecture Notes in Computer Science , vol.2162 , pp. 309-318
    • Akkar, M.-L.1    Giraud, C.2
  • 2
    • 4944238084 scopus 로고
    • American National Standards Institute American National Standards Institute.
    • American National Standards Institute (1985). Financial Institution Key Management (Wholesale). American National Standards Institute.
    • (1985) Financial Institution Key Management (Wholesale)
  • 4
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • In Christianson, B., Crispo, B., Lomas, T. M. A., and Roe, M., editors, Springer-Verlag.
    • Anderson, R. and Kuhn, M. (1997). Low cost attacks on tamper resistant devices. In Christianson, B., Crispo, B., Lomas, T. M. A., and Roe, M., editors, Security Protocols, volume 1361 of Lecture Notes in Computer Science, pages 125-136. Springer-Verlag.
    • (1997) Security Protocols,of Lecture Notes in Computer Science , vol.1361 , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 7
    • 84903595110 scopus 로고
    • Differential cryptanalysis of des-like cryptosystems
    • In Menezes, A. and Vanstone, S., editors,of Lecture Notes in Computer Science,Springer-Verlag.
    • Biham, E. and Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. In Menezes, A. and Vanstone, S., editors, Advances in Cryptology - CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 2?-21. Springer-Verlag.
    • (1991) Advances in Cryptology - CRYPTO '90 , vol.537 , pp. 20-21
    • Biham, E.1    Shamir, A.2
  • 8
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • In Kaliski, B. S., editor,Springer-Verlag.
    • Biham, E. and Shamir, A. (1997). Differential fault analysis of secret key cryptosystems. In Kaliski, B. S., editor, Advances in Cryptology - CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 513-525. Springer-Verlag.
    • (1997) Advances in Cryptology - CRYPTO '97,of Lecture Notes in Computer Science , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 9
    • 35248884880 scopus 로고    scopus 로고
    • Fault based cryptanalysis of the advanced encryption standard (aes)
    • In Wright, R. N., editor,Springer-Verlag.
    • Bl̈omer, J. and Seifert, J.-P. (2003). Fault based cryptanalysis of the advanced encryption standard (AES). In Wright, R. N., editor, Financial Cryptography - FC 2003, volume 2742 of Lecture Notes in Computer Science, pages 162-181. Springer-Verlag.
    • (2003) Financial Cryptography - FC 2003,of Lecture Notes in Computer Science , vol.2742 , pp. 162-181
    • Bl̈omer, J.1    Seifert, J.-P.2
  • 13
    • 3042527150 scopus 로고    scopus 로고
    • Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    • Chevallier-Mames, B., Ciet, M., and Joye, M. (2004). Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Transactions on Computers, 53(6):760-768.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.6 , pp. 760-768
    • Chevallier-Mames, B.1    Ciet, M.2    Joye, M.3
  • 20
    • 31344456062 scopus 로고
    • The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits
    • Habing, D. H. (1992). The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits. IEEE Transactions On Nuclear Science, 39:1647-1653.
    • (1992) IEEE Transactions On Nuclear Science , vol.39 , pp. 1647-1653
    • Habing, D.H.1
  • 23
    • 79952087407 scopus 로고    scopus 로고
    • Side-channel attacks
    • In van Tilborg, H., editor,Kluwer Academic Publishers.
    • Joye, M. and Olivier, F. (2005). Side-channel attacks. In van Tilborg, H., editor, Encyclopedia of Cryptography and Security, pages 571-576. Kluwer Academic Publishers.
    • (2005) Encyclopedia of Cryptography and Security , pp. 571-576
    • Joye, M.1    Olivier, F.2
  • 25
    • 84889971633 scopus 로고    scopus 로고
    • Seminumerical Algorithms.Addison-Wesley, third edition
    • Knuth, D. (2001). The Art of Computer Programming, volume 2, Seminumerical Algorithms. Addison-Wesley, third edition.
    • (2001) The Art of Computer Programming , vol.2
    • Knuth, D.1
  • 26
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
    • In Koblitz, N., editor Springer-Verlag.
    • Kocher, P. (1996). Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Koblitz, N., editor, Advances in Cryptology - CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer-Verlag.
    • (1996) Advances in Cryptology - CRYPTO '96,of Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 28
  • 34
    • 84889970981 scopus 로고    scopus 로고
    • November 24MIPS-Technologies MIPS™architecture for programmers volume I: Introduction to the MIPS32™architecture. Technical Report MD00082, Revision 0.95
    • MIPS-Technologies (2001). MIPS™architecture for programmers volume I: Introduction to the MIPS32™architecture. Technical Report MD00082, Revision 0.95.
    • (2001)
  • 37
    • 0003508570 scopus 로고    scopus 로고
    • NIST National Institute of Standards and Technology.
    • NIST (1999). Data Encryption Standard (DES) (FIPS-46-3). National Institute of Standards and Technology.
    • (1999) Data Encryption Standard (DES) (FIPS-46-3)
  • 38
  • 41
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., and Adleman, L. M. (1978). Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.M.3
  • 46
    • 0018716817 scopus 로고
    • Effect of cosmic rays on computer memories
    • Ziegler, J. (1979). Effect of cosmic rays on computer memories. Science, 206:776-788.
    • (1979) Science , vol.206 , pp. 776-788
    • Ziegler, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.