Home > Articles > Security > Network Security

  • Print
  • + Share This



J. Grand, "Attacks on and Countermeasures for USB Hardware Token Devices,'' Proceedings of the Fifth Nordic Workshop on Secure IT Systems, 2000.


A. Huang, Hacking the Xbox: An Introduction to Reverse Engineering, No Starch Press, 2003.


F. Beck, Integrated Circuit Analysis—A Guide to Preparation Techniques, John Wiley & Sons, 1998.


O. Kömmerling and M. Kuhn, "Design Principles for Tamper-Resistant Smartcard Processors," USENIX Workshop on Smartcard Technology, 1999.


PIC Microcontroller discussion list, "Re: Code protect," Posted April 26, 1995.


P. Kocher, J. Jaffe, and B. Jun, "Overview of Differential Power Analysis."


T.S. Messerges, "Power Analysis Attack Countermeasures and Their Weaknesses," Communications, Electromagnetics, Propagation, & Signal Processing Workshop, 2000. See http://www.iccip.csl.uiuc.edu/ for transcripts.


P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology: Proceedings of Crypto '96.


B.S. Yee, "Using Secure Coprocessors," Carnegie Mellon University, 1994.


J. Dyer, M. Lindemann, R. Perez, R. Sailer, S.W. Smith, L. van Doorn, and S. Weingart, "Building the IBM 4758 Secure Coprocessor," IEEE Computer, October 2001.


M. Bond and R. Clayton, "Extracting a 3DES key from an IBM 4758."


J. Grand, "DS1991 MultiKey iButton Dictionary Attack Vulnerability," 2001.

  • + Share This
  • 🔖 Save To Your Account

Related Resources

There are currently no related titles. Please check back later.