메뉴 건너뛰기




Volumn 3, Issue 3, 2004, Pages 461-491

Security in Embedded Systems: Design Challenges

Author keywords

architecture; authentication; battery life; cryptographic algorithms; decryption; Design; Embedded systems; encryption; hardware design; processing requirements; Security; security; security attacks; security protocols; tamper resistance

Indexed keywords


EID: 85014332650     PISSN: 15399087     EISSN: 15583465     Source Type: Journal    
DOI: 10.1145/1015047.1015049     Document Type: Article
Times cited : (393)

References (56)
  • 2
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • Lecture Notes on Computer Science
    • Anderson, R., Kuhn, M., 1997. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols. Lecture Notes on Computer Science. 125-136.
    • (1997) IWSP: International Workshop on Security Protocols. , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 6
    • 3042641393 scopus 로고    scopus 로고
    • On the importance of eliminating errors in cryptographic computations
    • Boneh, D., Demillo, R., Lipton, R., 2001. On the importance of eliminating errors in cryptographic computations. Cryptology 14, 2, 101-119.
    • (2001) Cryptology , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    Demillo, R.2    Lipton, R.3
  • 11
    • 0004207324 scopus 로고    scopus 로고
    • Extended Static Checking
    • Tech. rep., Systems Research Center, Compaq Inc
    • Detlefs, D. L., Leino, K., Nelson, G., Saxe, J., 1998. Extended Static Checking. Tech. rep., Systems Research Center, Compaq Inc.
    • (1998)
    • Detlefs, D.L.1    Leino, K.2    Nelson, G.3    Saxe, J.4
  • 13
    • 84947222499 scopus 로고    scopus 로고
    • Cryptanalysis of the revised NTRU signature scheme
    • Gentry, C., Szydlo, M., 2002. Cryptanalysis of the revised NTRU signature scheme. In Proceedings of EUROCRYPT. 299-320.
    • (2002) Proceedings of EUROCRYPT. , pp. 299-320
    • Gentry, C.1    Szydlo, M.2
  • 15
    • 2342548663 scopus 로고    scopus 로고
    • Information leakage attacks against smart card implementations of cryptographic algorithms and countermeasures
    • Hess, E., Janssen, N., Meyer, B., Schutze, T., 2000. Information leakage attacks against smart card implementations of cryptographic algorithms and countermeasures. In Proceedings of the EUROSMART Security Conference. 55-64.
    • (2000) Proceedings of the EUROSMART Security Conference. , pp. 55-64
    • Hess, E.1    Janssen, N.2    Meyer, B.3    Schutze, T.4
  • 27
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Lecture Notes in Computer Science Springer-Verlag, Berlin
    • Kocher, P. C., 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Advances in Cryptology-CRYPTO'96. Lecture Notes in Computer Science, vol. 1109. Springer-Verlag, Berlin, 104-113.
    • (1996) Advances in Cryptology-CRYPTO'96. , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 28
    • 0038650645 scopus 로고    scopus 로고
    • The Trust No 1 Cryptoprocessor Concept
    • CS555 Report, Purdue University
    • Kuhn, M., 1997. The Trust No 1 Cryptoprocessor Concept. CS555 Report, Purdue University.
    • (1997)
    • Kuhn, M.1
  • 30
    • 0035517885 scopus 로고    scopus 로고
    • Efficient permutations for fast software cryptography
    • Dec
    • Lee, R. B., Shi, Z., Yang, X., 2001. Efficient permutations for fast software cryptography. IEEE Micro 21, 6 (Dec.), 56-69.
    • (2001) IEEE Micro , vol.21 , Issue.6 , pp. 56-69
    • Lee, R.B.1    Shi, Z.2    Yang, X.3
  • 31
    • 0002449750 scopus 로고    scopus 로고
    • Subword parallelism with Max-2
    • Aug
    • Lee, R. B., 1996. Subword parallelism with Max-2. IEEE Micro 16, 4 (Aug.), 51-59.
    • (1996) IEEE Micro , vol.16 , Issue.4 , pp. 51-59
    • Lee, R.B.1
  • 35
    • 0036566408 scopus 로고    scopus 로고
    • Examining smartcard security under the threat of power analysis attacks
    • May
    • Messerges, T. S., Dabbish, E. A., Sloan, R. H., 2002. Examining smartcard security under the threat of power analysis attacks. IEEE Trans. Comput. 51, 5 (May), 541-552.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 37
    • 0141641166 scopus 로고    scopus 로고
    • Proof-Carrying Code
    • Tech. Rep. CMU-CS-96-165, Carnegie Mellon University
    • Necula, G. C., Lee, P., 1996. Proof-Carrying Code. Tech. Rep. CMU-CS-96-165, Carnegie Mellon University.
    • (1996)
    • Necula, G.C.1    Lee, P.2
  • 56
    • 2342499036 scopus 로고    scopus 로고
    • A New Foundation for CPU Systems Security
    • ARM Limited
    • York, R., 2003. A New Foundation for CPU Systems Security. ARM Limited.
    • (2003)
    • York, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.