[1] R.J. Anderson, M. G. Kuhn, Tamper
Resistance - a Cautionary Note, in The Second USENIX Workshop on
Electronic Commerce Proceedings, pp.1-11
[2] E. Biham, A. Shamir, A
New Cryptanalytic Attack on DES, (nebo jako text),
preprint, 18/10/96
[3] E. Biham, A. Shamir, Differential
Fault Analysis: Identifying the Structure of Unknown Ciphers Sealed in
Tamper-Proof Devices, (nebo jako text),
preprint, 10/11/96
[4] R. J. Anderson, M. G. Kuhn, Improved
Differnetial Fault Analysis, 1996
[5] Eli Biham, Adi Shamir, The
Next Stage of Differential Fault Analysis: How to break completely unknown
cryptosystems, (nebo jako text),
October 30th, 1996
[6] Ross Anderson, Why
Croptosystems Fail, in Comunications of the ACM v7 no11 (Nov 94), pp.
32-40
[7] P. Wayner, Cryptographers
Discuss Finding of Security Flaw in 'Smart Cards', (or as text)
NY Times, June 10, 1998
[8] P. Kocher, J. Jaffe, B. Jun, Introduction
to Differential Power Analysis and Related Attacks, Cryptography Research
[9] E. Biham, A. Shamir, Differential
Fault Analysis of Secret Key Cryptosystems, Technical report CS 0910,
revised
[10] Ross Anderson, Markus Kuhn, Low
Cost Attacks on Tamper Resistant Devices, proceedings of the 1997 Security
Protocols Workshop, Paris, April 7-9, 1997
[11] Paul C.Kocher, Timing
Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems,
Lecture Notes in Computer Science, Advances in Cryptology,
proceedings of CRYPTO'96, pp.
104-113, 1996
A nějaké další zdroje:
[1] R. J. Anderson, Liability
and Computer Security - Nine Principles
[2] R. J. Anderson, Papers
on Smartcard Engineering tento dokument obsahuje dva èlánky:
Making Smartcard Systems Robust a UEPS - A Second Generation Wallet
[3] R. J. Anderson, The
Formal Verification of a Payment System Warning
to Crypto and Banking Communities - A Serious Weakness of DES, November
1996
[4] R. J. Anderson, S. J. Bezuidenhoundt, On
the Reliability of Electronic Payment Systems
[5] R. J. Anderson, R. Needham, Robustnesss
Principles for Public Key Protocols
[6] Now,
Smart Cards Can Leak Secrets ... , (nebo jako text)
NY Times, September 25, 1996
[7] A new
use of a new crypto attack, (nebo jako
text),
Re: Shamir, RISKS-18.54
[8] New Threat
Models Break Crypto Codes, (nebo jako text)
[9] P. Kocher, Differential
Power Analysis , (nebo
jako text)