An Open Approach for Designing Secure Electronic Immobilizers
暂无分享,去创建一个
[1] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[2] Bruce Schneier,et al. Side Channel Cryptanalysis of Product Ciphers , 1998, J. Comput. Secur..
[3] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[4] Yvo Desmedt,et al. Identification Tokens - or: Solving the Chess Grandmaster Problem , 1990, CRYPTO.
[5] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[6] W Thoennes,et al. Elektronische Fahrberechtigungssysteme - wie sicher ist noch sicher? / Electronical driving authority - how safe is safe? , 2003 .
[7] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[8] Colin Boyd,et al. Protocols for Key Establishment and Authentication , 2003 .
[9] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[10] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[11] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[12] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[13] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .