aewag / physical-attack-collection

0 stars 0 forks source link

Sung_Ming_Yen_2000 #465

Open aewag opened 3 hours ago

aewag commented 3 hours ago

WDYT? Is this publication in scope?

@article{Sung_Ming_Yen_2000,
 author = {Sung-Ming Yen and Joye, M.},
 doi = {10.1109/12.869328},
 issn = {0018-9340},
 journal = {IEEE Transactions on Computers},
 number = {9},
 pages = {967–970},
 publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
 title = {Checking before output may not be enough against fault-based cryptanalysis},
 url = {http://dx.doi.org/10.1109/12.869328},
 volume = {49},
 year = {2000}
}

URL: http://dx.doi.org/10.1109/12.869328 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1109/12.869328

aewag commented 3 hours ago

Yes

aewag commented 2 hours ago

I didnot find DOIs for the following references:

[
    {
        "key": "bibT096712",
        "article-title": "new threat model breaks crypto codes",
        "year": "1996"
    },
    {
        "key": "bibT096720",
        "article-title": "rsa hardware implementation",
        "author": "ko\ufffd",
        "year": "1996"
    },
    {
        "key": "bibT096715",
        "first-page": "421",
        "article-title": "hardwaresicherheit von mikrochips in chipkarten",
        "volume": "20",
        "author": "kocar",
        "year": "1996",
        "journal-title": "Datenschutz und Datensicherheit"
    },
    {
        "key": "bibT096714",
        "first-page": "77",
        "article-title": "secure deletion of data from magnetic and solid-state memory",
        "author": "gutmann",
        "year": "1996",
        "journal-title": "Proc Sixth Usenix Security Symp"
    },
    {
        "key": "bibT096711",
        "article-title": "comments on some new attacks on cryptographic devices",
        "author": "kaliski",
        "year": "1997"
    },
    {
        "key": "bibT096723",
        "article-title": "data encryption standard",
        "year": "1977"
    },
    {
        "key": "bibT096717",
        "author": "menezes",
        "year": "1997",
        "journal-title": "Handbook of Applied Cryptography"
    },
    {
        "key": "bibT09679",
        "article-title": "how to check modular exponentiation",
        "author": "shamir",
        "year": "1997"
    },
    {
        "key": "bibT09677",
        "article-title": "breaking real-world implementations of cryptosystems by manipulating their random number generation",
        "author": "zheng",
        "year": "1997",
        "journal-title": "Preproc 1997 Symp Cryptography and Information Security"
    },
    {
        "key": "bibT09673",
        "first-page": "37",
        "article-title": "on the importance of checking cryptographic protocols for faults",
        "author": "boneh",
        "year": "1997",
        "journal-title": "Proc Advances in Cryptology? EUROCRYPT 97"
    },
    {
        "key": "bibT09674",
        "first-page": "1",
        "article-title": "tamper resistance—a cautionary note",
        "author": "anderson",
        "year": "1996",
        "journal-title": "Proc Second Usenix Workshop Electronic Commerce"
    }
]