Remote Password Extraction from RFID Tags
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[2] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[3] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[4] I. Verbauwhede,et al. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards , 2002, Proceedings of the 28th European Solid-State Circuits Conference.
[5] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[6] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[7] Alexandre Yakovlev,et al. Design and analysis of dual-rail circuits for security applications , 2005, IEEE Transactions on Computers.
[8] Butler W. Lampson,et al. Hints for Computer System Design , 1983, IEEE Software.
[9] Klaus Finkenzeller,et al. Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.
[10] Günter Karjoth,et al. Disabling RFID tags with visible confirmation: clipped tags are silenced , 2005, WPES '05.
[11] Stefan Mangard. Exploiting Radiated Emissions - EM Attacks on Cryptographic ICs , 2003 .