LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Rae, Andrew; Wildman, Luke (2003)
Languages: English
Types: Other
Subjects:
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Abraham D.G., Dolan G.M., Double G.P., and Stevens J.V. (1991) Transaction security system. IBM Systems Journal, 30(2):206–228.
    • Ajluni C. (1995) Two new imaging techniques promise to improve IC defect identification. Electronic Design, 43(14):37–38, July.
    • Aleph One (1996) Smashing the stack for fun and profit, Phrack 49 Anderson R. (1996) Why cryptosystems fail. In Practical Cryptography for Data Internetworks, IEEE.
    • Anderson R. (2001) Security Engineering for Distributed Systems. Wiley.
    • Anderson R. and Kuhn M. (1996) Tamper Resistance – a Cautionary Note. In Proceedings of the Second Usenix Workshop on Electronic Commerce, pages 1–11, November.
    • Anderson R. and Kuhn M. (1997) Low cost attacks on tamper resistant devices. In Lecture Notes in Computer Science 1361, pages 135–136. Springer-Verlag.
    • Aslam T., Krsul I., and Spafford E. H. (1996) Use of a taxonomy of security faults. In Proc. 19th NIST-NCSC National Information Systems Security Conference, pages 551–560.
    • Bieber P. and Boulahia-Cuppens N. (1994) Formal development of authentication protocols. In D. Till, editor, Sixth Refinement Workshop, pages 801–802. Springer-Verlag.
    • Biham E, and Shamir A. (1997) Differential fault analysis of secret key cryptosystems. Lecture Notes in Computer Science, 1294, Springer-Verlag.
    • Blythe S., Fraboni B., Lall S., Ahmed H., and de Riu E. (1993) Layout reconstruction of complex silicon chips. IEEE Journal of Solid-State Circuits, 28(2):138–145, Feb.
    • Boneh D, DeMillo R.A., and Lipton R.J. (1997) On the importance of checking cryptographic protocols for faults. Lecture Notes in Computer Science, 1233:37–51, Springer-Verlag.
    • Bovelander (1998) Smart card security - How can we be so sure? In Lecture Notes in Computer Science, number 1528, pages 332–337. Springer-Verlag.
    • Brickell E.F. and Odlyzko A.M. (1991) Cryptanalysis: A survey of recent results. In G. J. Simmons, editor, Contemporary Cryptology, pages 501–540. IEEE Press.
    • Brown, R. (1997) Leaked national bank memo confirms pilot of Mondex broken. Computerworld News Wire, September.
    • Chari S., Jutla C., Rao J.R., and Rohatgi P. (1999) A cautionary note regarding evaluation of AES candidates on smartcards. In Second Advanced Encryption Standard (AES) Candidate Conference, Rome. http://csrc.nist.gov/encryption/aes/round1/conf2/aes2conf.htm.
    • Clark A.J. (1988) Physical protection of cryptographic devices. In D. Chaum and W.L. Price, editors, Lecture Notes in Computer Science 304, pages 83–93. Springer-Verlag.
    • Clark J. and Jacob J. (1996) Attacking Authentication Protocols. High Integrity Systems 1(5):465–474 Common Criteria (1999) Common Criteria for Information Technology Security Evaluation. Part 2: Evaluation Methodology. http://www.commoncriteria.org.
    • Handschuh H., Paillier P., and Stern J. (1999) Probing attacks on tamper-resistant devices. In Cryptographic Hardware and Embedded Systems, pages 303–315.
    • Howard M. (2000) Secure systems begin with knowing your threats.
    • http://archive.devx.com/upload/free/Features/zones/security/articles/2000/10oct00/mh1000[1]-1.asp Huang J. (2002) Keeping secrets in hardware: The Microsoft Xbox case study. Technical report 2002- 008, Massachusetts Institute of Technology - Artificial Intelligence Laboratory.
    • Rao J.R. and Rohatgi P. (2001) EMpowering side-channel attacks. Cryptography ePrint Archive 2001/037. http://eprint.iacr.org/2001/037/.
  • No related research data.
  • No similar publications.

Share - Bookmark

Funded by projects

Cite this article