[1] |
党彦峰 . Java 智能卡软件平台的设计与实现[D]. 上海:上海交通大学, 2008.
|
|
DANG Y F . The design and implementation of Java smart card software platform[D]. Shanghai:Shanghai Jiao Tong University, 2008.
|
[2] |
SéRé A A K , JULIEN I C , JLANET J L . Evaluation of countermeasures against fault attacks on smart cards[J]. International Journal of Security and Its Applications, 2011,5(2): 49-60.
|
[3] |
于晖 . 基于混合攻击的 Java 卡 3.0 安全性研究[J]. 信息安全与通信保密, 2014(9): 125-128.
|
|
YU H . Security study on Java card 3.0 based on hybrid attack[J]. Information Security and Communications Privacy, 2014(9): 125-128.
|
[4] |
AUMüLLER C , BIER P , FISCHER W . Fault attacks on RSA with CRT:concrete results and practical countermeasures[C]// The International Workshop on Cryptographic Hardware and Embedded Systems. 2002: 260-275.
|
[5] |
GIRAUD C , THIEBEAULD H . A survey on fault attacks[M]// Smart Card Research and Advanced Applications. Berlin: SpringerPress, 2004: 159-176.
|
[6] |
BARBU G , THIEBEAULD H , GUERIN V . Attacks on Java card 3.0 combining fault and logical attacks[C]// The International Conference on Smart Card Research and Advanced Application,IFIP Wg 8.8/11.2. 2010: 148-163.
|
[7] |
WU Y C , SUN Y Q . Analysis and research of securing from attack for java card[C]// The International Conference on E-Business and E-Government. 2010: 1296-1298.
|
[8] |
CHAUMETTE S , SAUVERON D . An efficient and SIMPLE way to test the security of Java cards TM[C]// The International Workshop on Security in Information Systems. 2006: 331-341.
|
[9] |
WITTEMAN M . Java card security[J]. Information Security Bulletin, 2003,8(10): 291-298.
|
[10] |
MOSTOWSKI W , POLL E . Malicious code on Java card smartcards:attacks and countermeasures[C]// The International Conference on Smart Card Research and Advanced Applications,IFIP Wg 8.8/11.2. 2008: 1-16.
|
[11] |
BARBU G , DUC G , HOOGVORST P . Java card operand stack:fault attacks,combined attacks and countermeasures[M]// Smart Card Research and Advanced Applications. Berlin Heidelberg: SpringerPress, 2011: 297-313.
|
[12] |
PAUL C . Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[M]// Advances in Cryptology —CRYPTO’96. Berlin: SpringerPress, 1996: 104-113.
|
[13] |
VERMOEN D , WITTEMAN M , GAYDADJIEV G N . Reverse engineering Java card applets using power analysis[C]// The International Workshop on Information Security Theory and Practices.Smart Cards,Mobile and Ubiquitous Computing Systems,First IFIP TC6 / WG 8.8 / WG 11.2. 2007: 138-149.
|