R. Anderson, M. Kuhn, "Tamper Resistance - a Cautionary Note", 2nd USENIX Workshop on Electronic Commerce, available at http://www.cl.cam.ac.uk/~mgk25/tamper.pdf
R. Anderson, M. Kuhn, "Low Cost Attacks on Tamper Resistant Devices", Security Protocols, 5th International Workshop, 1997.
R. Anderson, "A Serious Weakness of DES", news:CMM.0.90.1.847310320.risko@chiron.csl.sri.com, 2 Nov, 1996.
F. Bao, R. Deng, Y. Han, A. Jeng, T. H. Nagir, and D. Narasimhalu, "A New Attack to RSA on Tamperproof Devices", news, 2 Nov, 1996.
D. Boneh, R. A. DeMillo, and R. J. Lipton, "A New Breed of Crypto Attack on "Tamperproof" Tokens Cracks Even the Strongest RSA Code", 1996.
D. Boneh, R. A. DeMillo, R. J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults", Advances in Cryptology: Proceedings of Eurocrypt '97, Springer-Verlag, 1997, pp.37-51.
E. Biham, "New Types of Cryptanalytic Attacks Using Related Keys", Journal of Cryptology, Vol.7, No.4, 1994.
E. Biham, A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems", Advances in Cryptology: Proceedings of CRYPTO '97, Springer-Verlag, 1997, pp.513-525.
E. Biham, A. Shamir, "Power Analysis of the Key Scheduling of the AES Candidates", Proceedings of the Second Advanced Encryption Standard Candidate Conference, 1999.
D. Chaum, "Blind Signatures for Untraceable Payments", Proceedings of Advances in Cryptology - CRYPTO '82, 1983, pp.199-203.
S. Chari, C. Jutla, J. Rao, P. Rohatgi, "A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards", Proceedings of the Second Advanced Encryption Standard Candidate Conference, 1999.
S. Chari, C. Jutla, J. Rao, P. Rohatgi, "Toward Sound Approaches to Counter Power Analysis Attacks", Advances in Cryptology: Proceedings of CRYPTO '99, Springer-Verlag, 1999, pp.398-412.
J.-S. Coron, "Resistance Against Differential Power Analysis for Elliptic Curbe Cryptosystems", Proceedings of CHES '99, Springer-Verlag, 1999, pp.292-302.
National Bureau of Standards, "Data Encryption Standard", Federal Information Processing Standards Publication 46, 1977.
W. Diffie, M. E. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, IT-22, 6, Nov 1976, pp.644-654.
J.-F. Dhem, F. Koeune, P.-A. Leroux, P. Mestre, J.-J. Quisquater, J.-L. Willems, "A Practical Implementation of the Timing Attack", UCL Report, 1998, CG1998-1, available at http://www.dice.ucl.ac.be/crypto/techreports.html
J. Daemen, V. Rijmen, "AES Proposal: Rijndael", AES submission, 1998.
J. Daemen, V. Rijmen, "Resistance against Implementation Attacks: A Comparative Study of the AES Proposals", Proceedings of the 2nd AES Candidate Conference, 1999, pp.122-132.
U.S. DOC, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186, 1994; American National Standard Institute, ANSI X9.30: Public Key Cryptography Using Irreversible Algorithm For the Financial Services Industry: Part I: The Digital Signature Algorithm (DSA), 1995.
"EMV '96 Integrated Circuit Card Specification for Payment Systems Version 3.0", 1996.
"EMV '96 Integrated Circuit Card Specification for Payment Systems Version 3.1.1", 1998.
P. N. Fahn, "IPA: A New Class of Power Attacks", Proceedings of CHES' 99, Springer-Verlag, 1999, pp.173-186.
FIPS 140-1 "Security Requirements for Cryptographic Modules", NIST, 1994 January 11, available at http://csrc.nist.gov/fips/fips1401.htm
"Attacks on Cryptographic Modules based on the Analysis of Power Consumption", NIST, 1998 December 8, available at http://csrc.nist.gov/cryptval/140-1/poweranalysis.pdf
Draft FIPS 140-2 "Security Requirements for Cryptographic Modules", NIST, 1999, available at http://csrc.nist.gov/fips/dfips140-2.pdf
L. Goubin, J. Patarin, "DES and Differential Power Analysis", Proceedings of CHES '99, Springer-Verlag, 1999, pp.158-172.
久武,"マイクロソフトのICカード戦略", Card Wave 2000年1月号, 株式会社シーメディア, 2000, pp.52-55.
H. Handschuh, P. Paillier, J. Stern, "Probing Attacks on Tamper-Resistant Devices", Proceedings of CHES '99, Springer-Verlag, 1999, pp.303-315.
"ICカード総覧 '97-'98", 株式会社シーメディア, 1997.
"大特集 立ち上がり直前,国内ICカード市場最前線", Card Wave 1999年3月号, 株式会社シーメディア, 1999, p.17-.
"カードビジネスガイド'99 第2章カードビジネスを支えるテクノロジー", Card Wave 1999年5月号, 株式会社シーメディア, 1999, p.72-.
"特集 ETC実用化間近で,活発化するICカード市場動向", Card Wave 1999年9月号, 株式会社シーメディア, 1999, p.10-.
"特集 '99カードビジネス総決算", Card Wave 1999年12月号, 株式会社シーメディア, 1999, p.10-.
"次世代ICカードの需要予測とLSI&実装技術動向", ジャパン マーケティング サーベイ, 1999.
今泉,"多種多様なカードターミナルに適用可能な OpenCard Framework Java をベースにカードサービスの新時代を作り上げるか?", Card Wave 1999年3月号,株式会社シーメディア, 1999, pp.54-55.
"ISO/IEC 7816 Identification Cards - Integrated Circuit(s) Cards with Contacts".
"JavaCard 2.0 Application Programming Interfaces", Sun Microsystems, 1997.
"日本工業規格準拠 JICSAP 外部端子付きICカード仕様対応 発行ライブラリ仕様", ICカードシステム利用促進協議会, 1997.
M. Joye, J.-J. Quisquater, "Faulty RSA Encryption", UCL Report, 1997, CG1997-8, available at http://www.dice.ucl.ac.be/crypto/tech_reports/CG1997_8.ps.gz
P. Kocher, J. Jaffe, B. Jun, "Introduction to Differential Power Analysis and Related Attacks", 1998, available at http://www.cryptography.com/dpa/technical/index.html
P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", Advances in Cryptology: Proceedings of CRYPTO '99, Springer-Verlag, 1999, pp.388-397.
O. Kommerling, M. Kuhn, "Design Principles for Tamper-Resistant Smartcard Processors", USENIX Workshop on Smartcard Technology, 1999.
P. C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems", Advances in Cryptology: Proceedings of CRYPTO '96, Springer-Verlag, 1996, pp.104-113.
F. Koeune, J.-J. Quisquater, "A Timing Attack against Rijndael", UCL Report, 1999, CG1999-1, available at http://www.dice.ucl.ac.be/crypto/techreports.html
J. Kelsey, B. Schneier, D. Wagner, "Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES", LNCS1109, CRYPTO '96, 1996.
熊谷,"マイクロソフトにおけるスマートカードへの取り組み", Card Wave 1999年7月号,株式会社シーメディア, 1999, pp.16-19.
T. S. Messerges, E. A. Dabbish, R. H. Sloan, "Investigations of Power Analysis Attacks on Smartcards", USENIX Workshop on Smartcard Technology, 1999.
T. S. Messerges, E. A. Dabbish, R. H. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards", Proceedings of CHES '99, Springer-Verlag, 1999, pp.144-157.
盛合, 志帆, "故障利用暗号攻撃によるブロック暗号の解読", Proceeding of SCIS '97, 1997, 6A.
O. Piou, "SiShell, the First Hardware Solution that Enhances Smart Card Security", Proceedings of CARTES 98, 1998.
B. Preneel, M. Nuttin, V. Rijmen, J. Buelens, "Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds", LNCS, CRYPTO '93, 1993.
R. L. Rivest, "The RC5 Encryption Algorithm", Fast Software Encryption - Second International Workshop, Leuven, Belgium, LNCS 1008, Springer-Verlag, 1995, pp.86-96.
R. L. Rivest, A. Shamir, L. M. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems", Communications of the ACM, 21, 1978, pp.120-126.
"Microsoft Smart Card of Windows Workshop資料", Microsoft, 1999年8月.
DOD 5200.28-STD, TCSEC "Department of Defense Trusted Computer System Evaluation Criteria", National Computer Security Center, December 1985.
夕田, 木下, "スマートカード ガイドブック", 中央経済社, 1999.
"全銀協ICカード仕様(改訂版)", 全国銀行協会連合会, 1997.
鄭玉良, 松本勉, "暗号システムに対する乱数操作攻撃", Proceeding of SCIS '97, 6B, 1997.