1 |
J.R. Rao, P. Rohatgi, H. Scherzer and S. Tinguely, "Partitioning attacks: or how to rapidly clone some GSM cards," Proceeding of the 2002 IEEE Symposium on Security and Privacy, pp.31-41, 2002
|
2 |
Pedersen, A. Hedegaard and Anders "Security in POS systems," DK-2800, Technical University of Denmark, 2005
|
3 |
A manual of sensor, http://www.e2box.co.kr/category/기술정보%20및%20자료/EBMotion
|
4 |
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," Advances in Cryptology-CRYPTO'96, LNCS 1109, pp. 104-113, 1996
|
5 |
P. Kocher, J. Jaffe and B. Jun, "Differential power analysis," Advances in Cryptology-CRYPTO'99, pp. 388-397, Jan 1999.
|
6 |
P. Marquardt, A. Verma, H. Carter, and P. Traynor, "iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers," Proceedings of the 18th ACM conference on Computer and communications security, pp. 551-562, Oct. 2011
|
7 |
[saturday FOCUS] NSA has collected wiretap records using vibration on window, MK News, Nov. 1st 2013, http://news.mk.co.kr/news-Read.php?year=2013&no=1070547
|
8 |
M. Backes, M. Durmuth, S. Gerling, M. Pinkal, and C. Sporleder, "Acoustic side-channel attacks on printers.", USENIX Security Symposium, pp. 307-322, 2010
|
9 |
Chang-Kyun Kim and Il-Hwan Park, "Investigation of Side Channel Analysis Attacks on Financial IC Cards," Journal of the Korea Institute of Information Security and Cryptology, 18(1), pp. 31-39. Feb. 2008
과학기술학회마을
|
10 |
T.S Messerges, E.A Dabbish and R.H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552. May. 2002
DOI
ScienceOn
|
11 |
Y.C. ZHOU, Q.Y. CAO, L. GAN, S. FU, and L. GAO, "Embedded POS System Based on Security Module," Information Security and Communications Privacy, 11, 034. 2008
|
12 |
E. Oswald, S. Mangard, C. Herbst, and S. Tillich, "Practical second-order DPA attacks for masked smart card implementations of block ciphers," Proceedings of the 2006 The Cryptographers' Track at the RSA Conference on Topics in Cryptology, LNCS 3860, pp. 192-207, 2006.
|