Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
3.8 Further Reading
R. Anderson and M. Kuhn. Tamper Resistance—A Cautionary Note. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pages 1–11, 1996.
R. Anderson and M. Kuhn. Low Cost Attacks on Tamper Resistant Devices. In Proceedings of the 1997 Security Protocols Workshop, pages 125–136. Springer-Verlag LNCS 1361, 1997.
R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2001.
P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology—Crypto 96. Springer-Verlag LNCS 1109,1996.
P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Advances in Cryptology—Crypto 99. Springer-Verlag LNCS 1666, 1999.
S.W. Smith. Fairy Dust, Secrets and the Real Worl. IEEE Security and Privacy, 1:89–93, January/February 2003.
S. Weingart. Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses. In Cryptographic Hardware and Embedded Systems—CHES 2000, pages 302–317. Springer-Verlag LNCS 1965, 2000.
Rights and permissions
Copyright information
© 2005 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
(2005). Attacks. In: Trusted Computing Platforms: Design and Applications. Springer, Boston, MA. https://doi.org/10.1007/0-387-23917-0_3
Download citation
DOI: https://doi.org/10.1007/0-387-23917-0_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23916-3
Online ISBN: 978-0-387-23917-0
eBook Packages: Computer ScienceComputer Science (R0)