Java cryptography on KVM and its performance and security optimization using HW/SW co-design techniques
暂无分享,去创建一个
[1] Marc Renaudin,et al. High security smartcards , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[2] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[3] Srivaths Ravi,et al. Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..
[4] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[5] Bernd Meyer,et al. Information leakage attacks against smart card implementations of cryptographic algorithms and count , 2000 .
[6] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[7] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[8] Michael Juntao Yuan. Enterprise J2ME: Developing Mobile Java Applications , 2003 .
[9] Ingrid Verbauwhede,et al. Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology , 2003, CHES.
[10] Catherine H. Gebotys. Design of secure cryptography against the threat of power-attacks in DSP-embedded processors , 2004, TECS.