Physical Security Bounds Against Tampering
暂无分享,去创建一个
[1] Adi Shamir,et al. Fault Analysis of Stream Ciphers , 2004, CHES.
[2] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[3] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[4] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[5] Jean-Jacques Quisquater,et al. A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD , 2003, CHES.
[6] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[7] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[8] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[9] Moti Yung,et al. A Comparative Cost/Security Analysis of Fault Attack Countermeasures , 2006, FDTC.
[10] François-Xavier Standaert,et al. Electromagnetic Analysis and Fault Attacks : State of the Art , 2005 .
[11] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[12] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers , 2003 .
[13] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[14] Wieland Fischer,et al. Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures , 2002, CHES.
[15] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[16] Regis Leveugle,et al. Early analysis of fault-attack effects for cryptographic hardware , 2004 .
[17] Eli Biham,et al. Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4 , 2005, FSE.
[18] Silvio Micali,et al. Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering , 2004, TCC.
[19] George S. Taylor,et al. Security Evaluation of Asynchronous Circuits , 2003, CHES.
[20] Ramesh Karri,et al. Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers , 2003, CHES.
[21] Christof Paar,et al. An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices , 2006, FDTC.
[22] Christof Paar,et al. Cryptographic Hardware and Embedded Systems -- CHES 2003: 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings , 2003 .