Evaluation and Improvement of the Tempest Fonts
暂无分享,去创建一个
[1] Markus G. Kuhn,et al. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.
[2] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[3] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .
[4] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[5] Markus G. Kuhn,et al. Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.
[6] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[7] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[8] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[9] Thomas Jensen,et al. Smart Card Programming and Security , 2001, Lecture Notes in Computer Science.
[10] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.
[11] Peter Smulders,et al. The threat of information theft by reception of electromagnetic radiation from RS-232 cables , 1990, Comput. Secur..