next up previous contents
Next: この文書について... Up: 平成11年度 スマートカードの安全性に関する調査 調査報告書 Previous: IV.2.2 新しい攻撃法に対する処置

V. 参考文献

参考文献

[AK]

R. Anderson, M. Kuhn, "Tamper Resistance - a Cautionary Note", 2nd USENIX Workshop on Electronic Commerce, available at http://www.cl.cam.ac.uk/~mgk25/tamper.pdf

[AK97]

R. Anderson, M. Kuhn, "Low Cost Attacks on Tamper Resistant Devices", Security Protocols, 5th International Workshop, 1997.

[And96]

R. Anderson, "A Serious Weakness of DES", news:CMM.0.90.1.847310320.risko@chiron.csl.sri.com, 2 Nov, 1996.

[BD+96]

F. Bao, R. Deng, Y. Han, A. Jeng, T. H. Nagir, and D. Narasimhalu, "A New Attack to RSA on Tamperproof Devices", news, 2 Nov, 1996.

[BDL96]

D. Boneh, R. A. DeMillo, and R. J. Lipton, "A New Breed of Crypto Attack on "Tamperproof" Tokens Cracks Even the Strongest RSA Code", 1996.

[BDL97]

D. Boneh, R. A. DeMillo, R. J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults", Advances in Cryptology: Proceedings of Eurocrypt '97, Springer-Verlag, 1997, pp.37-51.

[Bih94]

E. Biham, "New Types of Cryptanalytic Attacks Using Related Keys", Journal of Cryptology, Vol.7, No.4, 1994.

[BS97]

E. Biham, A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems", Advances in Cryptology: Proceedings of CRYPTO '97, Springer-Verlag, 1997, pp.513-525.

[BS99]

E. Biham, A. Shamir, "Power Analysis of the Key Scheduling of the AES Candidates", Proceedings of the Second Advanced Encryption Standard Candidate Conference, 1999.

[Cha82]

D. Chaum, "Blind Signatures for Untraceable Payments", Proceedings of Advances in Cryptology - CRYPTO '82, 1983, pp.199-203.

[CJ+99a]

S. Chari, C. Jutla, J. Rao, P. Rohatgi, "A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards", Proceedings of the Second Advanced Encryption Standard Candidate Conference, 1999.

[CJ+99b]

S. Chari, C. Jutla, J. Rao, P. Rohatgi, "Toward Sound Approaches to Counter Power Analysis Attacks", Advances in Cryptology: Proceedings of CRYPTO '99, Springer-Verlag, 1999, pp.398-412.

[Cor99]

J.-S. Coron, "Resistance Against Differential Power Analysis for Elliptic Curbe Cryptosystems", Proceedings of CHES '99, Springer-Verlag, 1999, pp.292-302.

[DES77]

National Bureau of Standards, "Data Encryption Standard", Federal Information Processing Standards Publication 46, 1977.

[DH76]

W. Diffie, M. E. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, IT-22, 6, Nov 1976, pp.644-654.

[DK+98]

J.-F. Dhem, F. Koeune, P.-A. Leroux, P. Mestre, J.-J. Quisquater, J.-L. Willems, "A Practical Implementation of the Timing Attack", UCL Report, 1998, CG1998-1, available at http://www.dice.ucl.ac.be/crypto/techreports.html

[DR98]

J. Daemen, V. Rijmen, "AES Proposal: Rijndael", AES submission, 1998.

[DR99]

J. Daemen, V. Rijmen, "Resistance against Implementation Attacks: A Comparative Study of the AES Proposals", Proceedings of the 2nd AES Candidate Conference, 1999, pp.122-132.

[DSA95]

U.S. DOC, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186, 1994; American National Standard Institute, ANSI X9.30: Public Key Cryptography Using Irreversible Algorithm For the Financial Services Industry: Part I: The Digital Signature Algorithm (DSA), 1995.

[EMV96]

"EMV '96 Integrated Circuit Card Specification for Payment Systems Version 3.0", 1996.

[EMV98]

"EMV '96 Integrated Circuit Card Specification for Payment Systems Version 3.1.1", 1998.

[Fah99]

P. N. Fahn, "IPA: A New Class of Power Attacks", Proceedings of CHES' 99, Springer-Verlag, 1999, pp.173-186.

[FCC]

http://www.fcc.gov/

[FIP94]

FIPS 140-1 "Security Requirements for Cryptographic Modules", NIST, 1994 January 11, available at http://csrc.nist.gov/fips/fips1401.htm

[FIP98]

"Attacks on Cryptographic Modules based on the Analysis of Power Consumption", NIST, 1998 December 8, available at http://csrc.nist.gov/cryptval/140-1/poweranalysis.pdf

[FIP99]

Draft FIPS 140-2 "Security Requirements for Cryptographic Modules", NIST, 1999, available at http://csrc.nist.gov/fips/dfips140-2.pdf

[GP99]

L. Goubin, J. Patarin, "DES and Differential Power Analysis", Proceedings of CHES '99, Springer-Verlag, 1999, pp.158-172.

[His00]

久武,"マイクロソフトのICカード戦略", Card Wave 2000年1月号, 株式会社シーメディア, 2000, pp.52-55.

[HPS99]

H. Handschuh, P. Paillier, J. Stern, "Probing Attacks on Tamper-Resistant Devices", Proceedings of CHES '99, Springer-Verlag, 1999, pp.303-315.

[IC97]

"ICカード総覧 '97-'98", 株式会社シーメディア, 1997.

[IC99a]

"大特集 立ち上がり直前,国内ICカード市場最前線", Card Wave 1999年3月号, 株式会社シーメディア, 1999, p.17-.

[IC99b]

"カードビジネスガイド'99 第2章カードビジネスを支えるテクノロジー", Card Wave 1999年5月号, 株式会社シーメディア, 1999, p.72-.

[IC99c]

"特集 ETC実用化間近で,活発化するICカード市場動向", Card Wave 1999年9月号, 株式会社シーメディア, 1999, p.10-.

[IC99d]

"特集 '99カードビジネス総決算", Card Wave 1999年12月号, 株式会社シーメディア, 1999, p.10-.

[IC99e]

"次世代ICカードの需要予測とLSI&実装技術動向", ジャパン マーケティング サーベイ, 1999.

[Ima99]

今泉,"多種多様なカードターミナルに適用可能な OpenCard Framework Java をベースにカードサービスの新時代を作り上げるか?", Card Wave 1999年3月号,株式会社シーメディア, 1999, pp.54-55.

[ISO]

"ISO/IEC 7816 Identification Cards - Integrated Circuit(s) Cards with Contacts".

[JC]

http://www.sun.co.jp/javacard/

[JC97]

"JavaCard 2.0 Application Programming Interfaces", Sun Microsystems, 1997.

[JI97]

"日本工業規格準拠 JICSAP 外部端子付きICカード仕様対応 発行ライブラリ仕様", ICカードシステム利用促進協議会, 1997.

[JQ97]

M. Joye, J.-J. Quisquater, "Faulty RSA Encryption", UCL Report, 1997, CG1997-8, available at http://www.dice.ucl.ac.be/crypto/tech_reports/CG1997_8.ps.gz

[KJJ98]

P. Kocher, J. Jaffe, B. Jun, "Introduction to Differential Power Analysis and Related Attacks", 1998, available at http://www.cryptography.com/dpa/technical/index.html

[KJJ99]

P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", Advances in Cryptology: Proceedings of CRYPTO '99, Springer-Verlag, 1999, pp.388-397.

[KK99]

O. Kommerling, M. Kuhn, "Design Principles for Tamper-Resistant Smartcard Processors", USENIX Workshop on Smartcard Technology, 1999.

[Koc96]

P. C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems", Advances in Cryptology: Proceedings of CRYPTO '96, Springer-Verlag, 1996, pp.104-113.

[KQ99]

F. Koeune, J.-J. Quisquater, "A Timing Attack against Rijndael", UCL Report, 1999, CG1999-1, available at http://www.dice.ucl.ac.be/crypto/techreports.html

[KSW96]

J. Kelsey, B. Schneier, D. Wagner, "Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES", LNCS1109, CRYPTO '96, 1996.

[Kum99]

熊谷,"マイクロソフトにおけるスマートカードへの取り組み", Card Wave 1999年7月号,株式会社シーメディア, 1999, pp.16-19.

[MDS99a]

T. S. Messerges, E. A. Dabbish, R. H. Sloan, "Investigations of Power Analysis Attacks on Smartcards", USENIX Workshop on Smartcard Technology, 1999.

[MDS99b]

T. S. Messerges, E. A. Dabbish, R. H. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards", Proceedings of CHES '99, Springer-Verlag, 1999, pp.144-157.

[MS97]

盛合, 志帆, "故障利用暗号攻撃によるブロック暗号の解読", Proceeding of SCIS '97, 1997, 6A.

[MUL]

http://www.multos.com/

[OC]

http://www.opencard.org/

[PC]

http://www.pcscworkgroup.com/

[Pio98]

O. Piou, "SiShell, the First Hardware Solution that Enhances Smart Card Security", Proceedings of CARTES 98, 1998.

[PN+93]

B. Preneel, M. Nuttin, V. Rijmen, J. Buelens, "Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds", LNCS, CRYPTO '93, 1993.

[Riv95]

R. L. Rivest, "The RC5 Encryption Algorithm", Fast Software Encryption - Second International Workshop, Leuven, Belgium, LNCS 1008, Springer-Verlag, 1995, pp.86-96.

[RSA78]

R. L. Rivest, A. Shamir, L. M. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems", Communications of the ACM, 21, 1978, pp.120-126.

[SCW99]

"Microsoft Smart Card of Windows Workshop資料", Microsoft, 1999年8月.

[TCS85]

DOD 5200.28-STD, TCSEC "Department of Defense Trusted Computer System Evaluation Criteria", National Computer Security Center, December 1985.

[VISA]

http://www.visa.com/

[YK99]

夕田, 木下, "スマートカード ガイドブック", 中央経済社, 1999.

[ZGK97]

"全銀協ICカード仕様(改訂版)", 全国銀行協会連合会, 1997.

[ZM97]

鄭玉良, 松本勉, "暗号システムに対する乱数操作攻撃", Proceeding of SCIS '97, 6B, 1997.