-
8
-
-
8344240024
-
-
J. Watson Research Center, Revision of October 16
-
Sean W. Smith, Steve Weingart. Building a High-Performance, Programmable Secure Coprocessor, IBM T. J. Watson Research Center, Revision of October 16, 1998, available at www.research.ibm.com/secure-systems-department/ projects/scop/papers/arch.pdf.
-
(1998)
Building A High-Performance, Programmable Secure Coprocessor, IBM T
-
-
Smith, S.W.1
Weingart, S.2
-
9
-
-
0002380073
-
-
USENIX Association, Oakland, California, November 18-21, , ISBN 1-880446-83-9
-
Ross Anderson, Markus Kuhn. Tamper Resistance-A Cautionary Note, The Second USENIX Workshop on Electronic Commerce Proceedings, USENIX Association, Oakland, California, November 18-21, 1996, pp 1-11, ISBN 1-880446-83-9, available at www.cl.cam.ac.uk/~mgk25/tamper.pdf.
-
(1996)
Tamper Resistance-A Cautionary Note, the Second USENIX Workshop on Electronic Commerce Proceedings
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
10
-
-
85093467807
-
-
Chicago, Illinois, USA, May 10-11
-
Oliver Kömmerling, Markus G. Kuhn. Design Principles for Tamper-Resistant Smartcard Processors, USENIX Workshop on Smartcard Technology proceedings, Chicago, Illinois, USA, May 10-11, 1999, available at www.cl.cam.ac.uk/ ~mgk25/sc99-tamper.pdf.
-
(1999)
Design Principles for Tamper-Resistant Smartcard Processors, USENIX Workshop on Smartcard Technology Proceedings
-
-
Kömmerling, O.1
Kuhn, M.G.2
-
11
-
-
0004610703
-
-
, San Jose, California, July 22-25
-
Peter Gutmann. Secure Deletion of Data from Magnetic and Solid-State Memory, Sixth USENIX Security Symposium Proceedings, San Jose, California, July 22-25, 1996, pp 77-90, available at www.usenix.org/publications/library/ proceedings/sec96/full-papers/gutmann/.
-
(1996)
Secure Deletion of Data from Magnetic and Solid-State Memory, Sixth USENIX Security Symposium Proceedings
, pp. 77-90
-
-
Gutmann, P.1
-
12
-
-
68549107606
-
Protecting smart cards from passive power analysis with detached power supplies
-
Berlin
-
Adi Shamir. Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies, Cryptographic Hardware and Embedded Systems-CHES 2000, Springer, Lecture Notes in Computer Science, Vol. 1965, Berlin (2000), 71-77.
-
(2000)
Cryptographic Hardware and Embedded Systems-CHES 2000, Springer, Lecture Notes in Computer Science
, vol.1965
, pp. 71-77
-
-
Shamir, A.1
-
13
-
-
84889860677
-
-
Commission Regulation (EC) No 1360/2002 of 13 June 2002 adapting for the seventh time to technical progress Council Regulation (EEC) No 3821/85 on recording equipment in road transport, Annex 1 B, Requirements for Construction, Testing, Installation and Inspection
-
Commission Regulation (EC) No 1360/2002 of 13 June 2002 adapting for the seventh time to technical progress Council Regulation (EEC) No 3821/85 on recording equipment in road transport, Annex 1 B, Requirements for Construction, Testing, Installation and Inspection.
-
-
-
-
15
-
-
84889874014
-
-
Die neue Strategie der Autodiebe', Frankfurter Allgemeine Zeitung, 17.02., Nr. 40 / Seite T1
-
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan. The Sorcerer's Apprenctice's Guide to Fault Attacks, available at eprint. iacr.org/2004/100. 16. 'Die neue Strategie der Autodiebe', Frankfurter Allgemeine Zeitung, 17.02.2004, Nr. 40 / Seite T1.
-
(2004)
The Sorcerer's Apprenctice's Guide to Fault Attacks, Available at Eprint. iacr.org/2004/100. 16
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
|