References
[1] |
J. Grand, "Attacks on and Countermeasures for USB Hardware Token Devices,'' Proceedings of the Fifth Nordic Workshop on Secure IT Systems, 2000. |
[2] |
A. Huang, Hacking the Xbox: An Introduction to Reverse Engineering, No Starch Press, 2003. |
[3] |
F. Beck, Integrated Circuit AnalysisA Guide to Preparation Techniques, John Wiley & Sons, 1998. |
[4] |
O. Kömmerling and M. Kuhn, "Design Principles for Tamper-Resistant Smartcard Processors," USENIX Workshop on Smartcard Technology, 1999. |
[5] |
PIC Microcontroller discussion list, "Re: Code protect," Posted April 26, 1995. |
[6] |
P. Kocher, J. Jaffe, and B. Jun, "Overview of Differential Power Analysis." |
[7] |
T.S. Messerges, "Power Analysis Attack Countermeasures and Their Weaknesses," Communications, Electromagnetics, Propagation, & Signal Processing Workshop, 2000. See http://www.iccip.csl.uiuc.edu/ for transcripts. |
[8] |
P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology: Proceedings of Crypto '96. |
[9] |
B.S. Yee, "Using Secure Coprocessors," Carnegie Mellon University, 1994. |
[10] |
J. Dyer, M. Lindemann, R. Perez, R. Sailer, S.W. Smith, L. van Doorn, and S. Weingart, "Building the IBM 4758 Secure Coprocessor," IEEE Computer, October 2001. |
[11] |
M. Bond and R. Clayton, "Extracting a 3DES key from an IBM 4758." |
[12] |
J. Grand, "DS1991 MultiKey iButton Dictionary Attack Vulnerability," 2001. |