Cryptanalysis of the m-Permutation Protection Schemes
暂无分享,去创建一个
[1] James W. Gray,et al. On m-Permutation Protection Scheme Against Modification Attack , 1999, ACISP.
[2] James W. Gray,et al. Protection Against EEPROM Modification Attacks , 1998, ACISP.
[3] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[4] Robert H. Deng,et al. Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults , 1997, Security Protocols Workshop.
[5] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[6] Walter Fumy,et al. Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.
[7] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[8] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[9] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.