Author:
Kocher Paul,Jaffe Joshua,Jun Benjamin
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. R. Anderson, M. Kuhn, “Low Cost Attacks on Tamper Resistant Devices,” Security Protocol Workshop, April 1997,
http://www.cl.cam.ac.uk/ftp/users/rja14/tamper2.ps.gz
.
2. R. Anderson and M. Kuhn, “Tamper Resistance-a Cautionary Note”, The Second USENIX Workshop on Electronic Commerce Proceedings, November 1996, pp. 1–11.
3. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
4. E. Biham and A. Shamir, “Differential Fault Analysis of Secret Key Cryptosystems,” Advances in Cryptology: Proceedings of CRYPTO’ 97, Springer-Verlag, August 1997, pp. 513–525.
5. D. Boneh, R. DeMillo, and R. Lipton, “On the Importance of Checking Cryptographic Protocols for Faults,” Advances in Cryptology: Proceedings of EURO-CRYPT’ 97, Springer-Verlag, May 1997, pp. 37–51.
Cited by
2661 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献