참고문헌
- Juels, A et al., The Blocker Tag : Selective Blocking of RFID Tags for Consumer Privacy, 10th ACM Conference on Computer and Communications Security, 2003
- S. A Weis, S. Sanna, R. Rivest, and D. Engels, Security and privacy aspects of low-cost radio frequency identication systems, In First International Conference on Security in Pervasive Computing, 2003
- S.E. Sanna, Towards the five-cent tag, Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Available from http//www.autoidcenter.org
- CRYPTOREC reports, published 2002
- The 5-cent RFID tag, RFID Journal, Feb.16, 2004
- G. Swamy and S.Sarma, Manufacturing Cost Simulations for Low Cost RFID systems, White Paper, MIT Auto-ID Center, 2003. http//www.autoidlabs.org/whitepapers/mit-autoid-wh017.pdf
- K. Takaragi, M. Usami, R. Imura, R. Itsuki, and T. Satoh, An ultra small individual recognition security chip. IEEE Micro, 21(6):43-49, 2001 https://doi.org/10.1109/40.977757
- Atmel Corporation. Atmel TK5552 data sheet, 2001. Available at http//www. atmel.com/ atmel/products/prod227.htm
- Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, Cryptographic Approach to 'Privacy-Friendly' Tags, submitted 2003
- Stephen A Weis, Security and Privacy in Radio-Frequency Identification Devices, Masters Thesis. MIT. May, 2003
- National Institute of Standards and Technology, Federal Information Processing Standards Publication 197, Announcing the Advanced Encryption Standard(AES), 2001
-
Samsung STD150 library databook, '0.13
${\mu}m$ 1.2V CMOS Standard Cell Library for Pure Logic Products' - P.C. Kocher. Cryptanalysis of Diffe-Hellman, RSA, DSS, and Other Cryptosystems Using Timing Attacks, In Advances in Cryptology, CRYPTO'95 15th Annual Int. Cryptology Conf., D. Coppersmith, Ed., Springer LNCS 963, pp171-183, 1995
- D. Boneh, R. DeMilio, and R. Lipton, On the importance of checking crypto -graphic protocols for faults, Journal of Cryptology, Springer-Verlag, Vol. 14, No.2, pp. 101-119, 2001. Extended abstract in Proceedings of Eurocrypt '97, Lecture Notes in Computer Science, Vol. 1233, Springer-Verlag, pp. 37-51, 1997
- P. Kocher, J. Jaffe, and B. Jun, Introduction to Differential Power Analysis and Related Attacks, http://www.cryptography.com/dpa/technical 1998
- 최병윤, 서정욱, 'SEED 알고리즘용 암호 보조 프로세서의 설계,' 한국통신학회논문지, 25(9), pp. 1609-1616, 2000
- 최홍묵, 최병렬, '스마트차드용 고성능 SEED 프로세서의 구현,' 한국정보보호학회논문지, pp. 37-47, 2004