1[1]Schneier B. Cryptographic designs vulnerabilities. IEEE Computer, September 1998;31(9):29~33
2[2]Rowley T. How to break a smart card. In: The 1997 RSA Data Security Conference Proceedings,RSA Data Security, Inc, 1997
3[3]Anderson R, Kuhn M. Tamper resistance-a cautionary note. In:Second USENIX Workshop on Electronic Commerce Proceedings, 1996:1~11
4[4]Biham E, Shamir A. Differential fault analysis of secret key cryptosystems. In: Crypto’97 Proceedings, Springer-Verlag, 1997:513~525
5[5]Kocher P. Timing attacks on implementations of Diffe-Hellman, RSA, DSS, and other systems. In: Crypto’96 Proceedings, Springer-Verlag, 1996:104~113
6[6]Simmons G J. Subliminal channels: past and present. European Transactions on Telecommunications, 1994;4(4):459~473