참고문헌
- Trusted Mobile Platform NTT DoCoMo, IBM, Intel. Trusted Mobile Platform: Hardware Architecture Description Rev1.0. Trusted Computing Group, 2004.
- Trusted Computing Group, TCG mobile reference architecture specification, version 1.0, June. 2007. https://www.trustedcomputinggroup.org
- Roger L. Kay, “How Hardware Security Will Become Nearly Ubiquitous as a Rock Solid Solution to Safeguarding Connected Computing,”2006. http://www.ndpta.com/TPMForecast.html
- ETSI TS 102.221: “ICC-Terminal Interface; Physical and Logical Characteristics
- K.Shimohigashi and K.Seki, “Low-Voltage ULSI Design,”IEEE Journal of Solid State Circuits, 28(4), pp.408-413, 1993. https://doi.org/10.1109/4.210022
- NSA, Fact Sheet Suite B Cryptography, http://www.nsa.gov/ia/industry/crypto\_suite\_b.cfm
- Trusted Computing Group, Trusted Module Library:Commands and Structures, Specification version 0.7, Level 1 Revision 030, 28 NOV., 2007.
- M.Feldhofer and C.Rechberger, “ Case Against Used Hash Functions in RFID Protocols,”OTM Workshops 2006, LNCS 4277, pp. 372-381, 2006
- Y.Choi et al, “Low power implementation of SHA-1 algorithm for RFID system,”Proc. of ISCE 2006, pp.1-5, 2006.
- M.Feldhofer and J.Wolkerstorfer, “Strong Crypto for RFID Tags -A Comparison of Low-Power Hardware Implementations,”Proc. of ISCS 2007, pp.1839-1842, 2007.
- Toru Hisakad et al, “61.5mW 2048-bit RSA Cryptographic Co-processor LSI based on N bit-wised Modular Multiplier,”IEEE VLSI-DAT, pp. 1-4, 2006
- Xinjian Zheng, Zexiang Liu, and Bo Peng, “Design and Implementation of an Ultra Low Power RSA Coprocessor,”IEEE WiCOM'08, pp. 1-5, 2008
- Chingwei Yeh, En-Feng Hsu, “An 830mW, 586kbps 1024-bit RSA Chip Design” Proceedings of the Conference on Design, Automation and Test in Europe, pp. 24-29, 2006
- AT97SC3203 Advance Information Summary, Atmel, http://www.atmel.com/dyn/products/product_card.asp?part_id=3736.
- SSX35A, Sinosun, available at: http://www.sinosun.com.cn/eng/product/index.asp
- EISC3208, ADChip Inc., http://www.adc.co.kr/.
피인용 문헌
- An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units vol.8, pp.1, 2012, https://doi.org/10.3745/JIPS.2012.8.1.159
- A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition vol.5, pp.10, 2012, https://doi.org/10.1002/sec.511