메뉴 건너뛰기




Volumn , Issue , 1999, Pages

Design principles for tamper-resistant smartcard processors

Author keywords

[No Author keywords available]

Indexed keywords

INTEGRATED CIRCUIT DESIGN; ION BEAMS; SIDE CHANNEL ATTACK;

EID: 85093467807     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (416)

References (19)
  • 1
    • 0003584029 scopus 로고
    • FIPS PUB 140-1: National Institute of Standards and Technology, U.S. Department of Commerce, 11 January
    • FIPS PUB 140-1: Security Requirements for Cryptographic Modules. National Institute of Standards and Technology, U.S. Department of Commerce, 11 January 1994.
    • (1994) Security Requirements for Cryptographic Modules
  • 9
    • 0027542367 scopus 로고
    • Layout Reconstruction of Complex Silicon Chips
    • February
    • S. Blythe, et al.: Layout Reconstruction of Complex Silicon Chips. IEEE Journal of Solid-State Circuits, 28(2):138-145, February 1993.
    • (1993) IEEE Journal of Solid-State Circuits , vol.28 , Issue.2 , pp. 138-145
    • Blythe, S.1
  • 10
    • 84948990454 scopus 로고    scopus 로고
    • Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective
    • R. Hirschfeld (ed): Springer-Verlag
    • D.P. Maher: Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective. In R. Hirschfeld (ed.): Financial Cryptography, FC'97, Proceedings, LNCS 1318, pp. 109-121, Springer-Verlag, 1997.
    • (1997) Financial Cryptography, FC'97, Proceedings, LNCS , vol.1318 , pp. 109-121
    • Maher, D.P.1
  • 11
    • 84957018842 scopus 로고    scopus 로고
    • Low Cost Attacks on Tamper Resistant Devices
    • M. Lomas, et al. (eds), Springer-Verlag
    • R.J. Anderson, M.G. Kuhn: Low Cost Attacks on Tamper Resistant Devices. In M. Lomas, et al. (eds.), Security Protocols, 5th International Workshop, LNCS 1361, pp. 125-136, Springer-Verlag, 1997
    • (1997) Security Protocols, 5th International Workshop, LNCS , vol.1361 , pp. 125-136
    • Anderson, R.J.1    Kuhn, M.G.2
  • 14
    • 84984062259 scopus 로고
    • Electron Beam Testing: Methods and Applications
    • H. P. Feuerbaum: Electron Beam Testing: Methods and Applications. Scanning, 5(1):14-24, 1982.
    • (1982) Scanning , vol.5 , Issue.1 , pp. 14-24
    • Feuerbaum, H. P.1
  • 15
    • 0021477994 scopus 로고
    • Short-Circuit Dissipation of Static CMOS Circuitry and Its Impact on the Design of Buffer Circuits
    • August
    • H.J.M. Veendrick: Short-Circuit Dissipation of Static CMOS Circuitry and Its Impact on the Design of Buffer Circuits. IEEE Journal of Solid-State Circuits, 19(4):468-473, August 1984.
    • (1984) IEEE Journal of Solid-State Circuits , vol.19 , Issue.4 , pp. 468-473
    • Veendrick, H.J.M.1
  • 16
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Springer-Verlag
    • D. Boneh, R.A. DeMillo, R.J. Lipton: On the Importance of Checking Cryptographic Protocols for Faults. In Advances in Cryptology - EUROCRYPT'97, LNCS 1233, pp. 37-51, Springer-Verlag, 1997.
    • (1997) Advances in Cryptology - EUROCRYPT'97, LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 17
    • 84956981493 scopus 로고    scopus 로고
    • Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults
    • M. Lomas, et al. (eds), Springer-Verlag
    • F. Bao, et al.: Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. In M. Lomas, et al. (eds.), Security Protocols, 5th International Workshop, LNCS 1361, pp. 115-124, Springer-Verlag, 1997.
    • (1997) Security Protocols, 5th International Workshop, LNCS , vol.1361 , pp. 115-124
    • Bao, F.1
  • 18
    • 84949230268 scopus 로고    scopus 로고
    • RSA-type Signatures in the Presence of Transient Faults
    • Springer-Verlag
    • M. Joye, J.-J. Quisquater, F. Bao, R. H. Deng: RSA-type Signatures in the Presence of Transient Faults. In Cryptography and Coding, LNCS 1355, pp. 155-160, Springer-Verlag, 1997.
    • (1997) Cryptography and Coding, LNCS , vol.1355 , pp. 155-160
    • Joye, M.1    Quisquater, J.-J.2    Bao, F.3    Deng, R. H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.