1 |
Proven Security IP for Next-Generation SOCs, Retrieved November, 2007, from http://www.safenet-inc.com/solutions/dev/intProp.asp
|
2 |
R.F. Buskey, B.B. Frosik, "Protected JTAG", Proceedings of the 2006 International Conference Workshops on Parallel Processing, pp. 405-414, 2006
|
3 |
ARM, Designing with TrustZone - Hardware Requirements, Retrieved August, 2007, from http://www.arm.com/pdfs/TrustZone_Hardware_Requir ements.pdf
|
4 |
A. Ashkenazi, Security Features in the i.MX31 and i.MX31L Multimedia Applications Processors, Retrieved August, 2007, from http://www.freescale.com/files/32bit/doc/white_paper/I MX31SECURITYWP.pdf
|
5 |
J. Grand, "Practical Secure Hardware Design for Embedded Systems", presented at the Embedded Systems Conference, San Francisco, California, March 29, 2004
|
6 |
Am29LV800D datasheet, Retrieved November, 2007, from http://www.amd.com/us-en/assets/content_type/white_ papers_and_tech_docs/Am29LV800D_00_A4_E.pdf
|
7 |
주학수, 주홍돈, 김승주, "고속 암호연산 프로세서 개 발현황", 한국정보보호학회지, 1598-3978, 제12권3호, pp. 48-56, 2002
|
8 |
IEEE Standard Test Access Port and Boundary-Scan Architecture, IEEE Standard 1149.1, 2001
|
9 |
B. Schneier, Applied cryptography, 1996
|
10 |
원동호, 현대 암호학, 도서출판 그린, 2006
|