Home > Articles > Security > Network Security

  • Print
  • + Share This

References

[1]

J. Grand, "Attacks on and Countermeasures for USB Hardware Token Devices,'' Proceedings of the Fifth Nordic Workshop on Secure IT Systems, 2000.

[2]

A. Huang, Hacking the Xbox: An Introduction to Reverse Engineering, No Starch Press, 2003.

[3]

F. Beck, Integrated Circuit Analysis—A Guide to Preparation Techniques, John Wiley & Sons, 1998.

[4]

O. Kömmerling and M. Kuhn, "Design Principles for Tamper-Resistant Smartcard Processors," USENIX Workshop on Smartcard Technology, 1999.

[5]

PIC Microcontroller discussion list, "Re: Code protect," Posted April 26, 1995.

[6]

P. Kocher, J. Jaffe, and B. Jun, "Overview of Differential Power Analysis."

[7]

T.S. Messerges, "Power Analysis Attack Countermeasures and Their Weaknesses," Communications, Electromagnetics, Propagation, & Signal Processing Workshop, 2000. See http://www.iccip.csl.uiuc.edu/ for transcripts.

[8]

P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology: Proceedings of Crypto '96.

[9]

B.S. Yee, "Using Secure Coprocessors," Carnegie Mellon University, 1994.

[10]

J. Dyer, M. Lindemann, R. Perez, R. Sailer, S.W. Smith, L. van Doorn, and S. Weingart, "Building the IBM 4758 Secure Coprocessor," IEEE Computer, October 2001.

[11]

M. Bond and R. Clayton, "Extracting a 3DES key from an IBM 4758."

[12]

J. Grand, "DS1991 MultiKey iButton Dictionary Attack Vulnerability," 2001.


  • + Share This
  • 🔖 Save To Your Account

Related Resources

There are currently no related titles. Please check back later.