1. Hazay, C., Lindell, Y.: Constructions of truly practical secure protocols using standard smartcards. In: CCS 2008, pp. 491–500. ACM, New York (2008)
2. Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS 2001, pp. 136–145 (2001)
3. Sharangpani, H.P., Barton, M.L.: Statistical analysis of floating point flaw in the PentiumTMprocessor. White paper, Intel Corporation (1994)
4. Lecture Notes in Computer Science;E. Biham,2008
5. Security, H.: Hacker extracts crypto key from TPM chip (2010),
http://www.h-online.com/security/news/item/Hacker-extracts-crypto-key-from-TPM-chip-927077.html