参考文献
[1] Application of Attack Potential to Smartcards Version 2.7 Revision 1[R]. British Standards Institution, Tech. Rep.: CCBD-2009-03-001, 2009.
[2] EMVCo. LLC, Security Guidelines for Smart Card Integrated Circuits Version 2.0[EB/OL]. [2013-05-01]. http://www. emvco.com/specifications.aspx?id=71.
[3] Kocher P, Jae J, Jun B. Dierential Power Analysis[C]//Proc. of CRYPTO’99. Santa Barbara, USA: Springer-Verlag, 1999: 388-397.
[4] Quisquater J J, Samyde D. Electromagnetic Analysis(EMA): Measures and Counter-measures for Smart Cards[C]//Proc. of International Conference on Smart Card Programming and Security. Cannes, France: [s. n.], 2001: 200-210.
[5] Skorobogatov S, Anderson R. Optical Fault Induction Attacks[C]//Proc. of CHES’02. San Francisco, USA: [s. n.], 2002: 2-12.
[6] International Organization for Standardization. ISO/IEC 18045-2008 Common Methodology for Information Technology Security Evaluation[S]. 2008.
[7] Schneier B. Secrets and Lies[M]. [S. l.]: John Wiley and Sons Inc., 2000.
[8] 甘早斌, 吴 平, 路松峰, 等. 基于扩展攻击树的信息系统安全风险评估[J]. 计算机应用研究, 2007, 24(11): 20-21.
[9] Evans S, Waller J. Risk-based Security Engineering Through the Eyes of the Adversary[C]//Proc. of the 6th IEEE Systems, Man and Cybemetics Information Assurance Workshop. NewYork, USA: IEEE Computer Society Press, 2005: 158-165.
[10] 王永杰, 刘 进, 陈志杰, 等. 一种计算机网络脆弱性评估系统的设计[J]. 计算机工程, 2006, 32(17): 200-202.
[11] 包乌日吐. 浅谈智能卡系统中的探测传感器设计[J]. 中国集成电路, 2011, 20(12): 32-37.
[12] 韩 军, 曾晓洋, 汤庭鳖. 基于时间随机化的密码芯片防攻击方法[J]. 计算机工程, 2007, 33(2): 6-8.
[13] Tiri K. A Digital Design Flow for Secure Integrated Circuits[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2006, 25(7): 1197-1208.
[14] Messerges T. Securing the AES Finalists Against Power an Analysis Attacks[C]//Proc. of FSE’01. Heidelberg, Germany: Springer-Verlag, 2001: 150-164.
[15] Boscher A, Naciri R, Prouff E. CRT RSA Algorithm Protected Against Fault Attacks[C]//Proc. of WISTP’07. Heraklion, Greece: [s. n.], 2007: 229-243.
编辑 金胡考 |