KR100867077B1 - 임의의 메세지 부여에 의해 억세스 보호가 이루어지는 휴대형 데이터 저장매체 및 그의 비밀 데이터 보호방법 - Google Patents
임의의 메세지 부여에 의해 억세스 보호가 이루어지는 휴대형 데이터 저장매체 및 그의 비밀 데이터 보호방법 Download PDFInfo
- Publication number
- KR100867077B1 KR100867077B1 KR1020027008263A KR20027008263A KR100867077B1 KR 100867077 B1 KR100867077 B1 KR 100867077B1 KR 1020027008263 A KR1020027008263 A KR 1020027008263A KR 20027008263 A KR20027008263 A KR 20027008263A KR 100867077 B1 KR100867077 B1 KR 100867077B1
- Authority
- KR
- South Korea
- Prior art keywords
- message
- data
- storage medium
- data storage
- intermediate result
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/723—Modular exponentiation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7233—Masking, e.g. (A**e)+r mod n
- G06F2207/7238—Operand masking, i.e. message blinding, e.g. (A+r)**e mod n; k.(P+R)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7233—Masking, e.g. (A**e)+r mod n
- G06F2207/7247—Modulo masking, e.g. A**e mod (n*r)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7257—Random modification not requiring correction
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Computational Mathematics (AREA)
- Strategic Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Human Computer Interaction (AREA)
- Storage Device Security (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
Abstract
Description
Claims (19)
- 다수의 명령어를 포함하는 연산 프로그램이 저장된 적어도 하나의 메모리를 갖는 반도체 칩을 가지며, 각 명령어는 반도체 칩 외부에서 탐지될 수 있는 신호를 발생시키는 데이터 저장매체에 있어서,상기 데이터 저장매체가 데이터 암호화를 위한 계산 과정에서 1회 이상 사용되는 데이터를 스크램블 할 때마다 서로 다른 함수를 사용하도록 설계된 것을 특징으로 하는 임의의 메세지 부여에 의해 엑서스보호가 이루어지는 데이터 저장매체.
- 제 1 항에 있어서,상기 스크램블되는 데이터는 암호화되는 메세지를 포함하는 것을 특징으로 하는 임의의 메세지 부여에 의해 엑서스보호가 이루어지는 데이터 저장매체.
- 제 1 항에 있어서,상기 사용된 데이터는 중간 결과이고, 곱셈 연산에 의해 실현되는 후속의 제곱 연산 이전에 서로 다른 함수를 사용하여 상기 중간 결과가 스크램블되는 것을 특징으로 하는 임의의 메세지 부여에 의해 엑서스보호가 이루어지는 데이터 저장매체.
- 제 1 항에 있어서,상기 사용된 데이터는 중간 결과이고, 중간 결과는 덧셈 과정으로 뒤따라 복제되고, 곱셈 연산에 의해 실현되는 후속의 제곱 연산 이전에 서로 다른 함수를 사용하여 상기 중간 결과가 스크램블되는 것을 특징으로 하는 임의의 메세지 부여에 의해 엑서스보호가 이루어지는 데이터 저장매체.
- 제 1항에 있어서,상기 계산은 지수 d에 "1"이 있다면 메세지 M이 사용되는 모듈로 연산에 의한 암호화 과정을 포함하고, 메세지 M은 각 사용마다 서로 다른 함수를 사용하여 변화되는 것을 특징으로 하는 임의의 메세지 부여에 의해 엑서스보호가 이루어지는 데이터 저장매체.
- 제 5항에 있어서,상기 메세지 M에 대해 인자 ri*n이 각 i(i=1...k)의 사용마다 더해지고, 이때 r은 임의값이고 n은 계수인 것을 특징으로 하는 임의의 메세지 부여에 의해 엑서스보호가 이루어지는 데이터 저장매체.
- 제 6 항에 있어서,상기 ri 는 모든 i에 대하여 동일한 값을 갖는 것을 특징으로 하는 임의의 메세지 부여에 의해 엑서스보호가 이루어지는 데이터 저장매체.
- 삭제
- 제 6항에 있어서,상기 계수 n은 상수 인자 k에 의해서 곱해지고, 후속의 모듈로 연산은 계수 n으로 수행되는 것을 특징으로 하는 임의의 메세지 부여에 의해 엑서스보호가 이루어지는 데이터 저장매체.
- 다수의 명령어를 포함하는 연산 프로그램이 저장된 적어도 하나의 메모리를 갖는 반도체 칩을 가지며, 각 명령어는 반도체 칩 외부에서 탐지될 수 있는 신호를 발생시키는 데이터 저장매체 비밀 데이터 보호 방법에 있어서,데이터 암호화를 위한 계산 과정에서 1회 이상 사용되는 데이터를 스크램블 할 때마다 서로 다른 함수를 사용하는 것을 특징으로 하는 데이터 저장매체의 비밀 데이터 보호방법.
- 제 10 항에 있어서,상기 스크램블되는 데이터는 암호화되는 메세지를 포함하는 것을 특징으로 하는 데이터 저장매체의 비밀 데이터 보호방법.
- 제 10 항에 있어서,상기 사용되는 데이터는 중간 결과이고, 곱셈 연산에 의해 실현되는 후속의 제곱 연산 이전에 서로 다른 함수를 사용하여 상기 중간 결과가 스크램블되는 것을 특징으로 하는 데이터 저장매체의 비밀 데이터 보호방법.
- 제 10 항에 있어서,상기 사용되는 데이터는 중간 결과이고, 중간 결과는 덧셈 과정으로 뒤따라 복제되고, 곱셈 연산에 의해 실현되는 후속의 제곱 연산 이전에 서로 다른 함수를 사용하여 상기 중간 결과가 스크램블되는 것을 특징으로 하는 데이터 저장매체의 비밀 데이터 보호방법.
- 제 10 항에 있어서,상기 계산은 지수 d에 "1"이 있다면 메세지 M이 사용되는 모듈로 연산에 의한 암호화 과정을 포함하고, 메세지 M은 각 사용에 대해 다양한 함수를 사용하여 변화되는 것을 특징으로 하는 비밀 데이터 보호방법.
- 삭제
- 제 14항에 있어서,상기 메세지 M에 대해 인자 ri*n 이 각 i(i=1...k)의 사용마다 더해지고, 이때 ri 는 임의값이고 n은 계수인 것을 특징으로 하는 데이터 저장매체의 비밀 데이터 보호방법.
- 제 16 항에 있어서,상기 ri 는 모든 i에 대하여 동일한 값을 갖는 것을 특징으로 하는 데이터 저장매체의 비밀 데이터 보호방법.
- 제 16항에 있어서,상기 계수 n은 상수 인자 k에 의해서 곱해지고, 후속의 모듈로 연산은 계수 n으로 수행되는 것을 특징으로 하는 비밀 데이터 보호방법.
- 삭제
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19963407A DE19963407A1 (de) | 1999-12-28 | 1999-12-28 | Tragbarer Datenträger mit Zugriffsschutz durch Nachrichtenverfremdung |
DE19963407.6 | 1999-12-28 |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20020075877A KR20020075877A (ko) | 2002-10-07 |
KR100867077B1 true KR100867077B1 (ko) | 2008-11-04 |
Family
ID=7934773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020027008263A KR100867077B1 (ko) | 1999-12-28 | 2000-12-20 | 임의의 메세지 부여에 의해 억세스 보호가 이루어지는 휴대형 데이터 저장매체 및 그의 비밀 데이터 보호방법 |
Country Status (13)
Country | Link |
---|---|
US (1) | US7441125B2 (ko) |
EP (1) | EP1272984B1 (ko) |
JP (1) | JP2003525538A (ko) |
KR (1) | KR100867077B1 (ko) |
CN (1) | CN1180568C (ko) |
AT (1) | ATE545921T1 (ko) |
AU (1) | AU3015101A (ko) |
DE (1) | DE19963407A1 (ko) |
ES (1) | ES2382615T3 (ko) |
HK (1) | HK1051928A1 (ko) |
RU (1) | RU2280285C2 (ko) |
WO (1) | WO2001048706A1 (ko) |
ZA (1) | ZA200204746B (ko) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2810138B1 (fr) * | 2000-06-08 | 2005-02-11 | Bull Cp8 | Procede de stockage securise d'une donnee sensible dans une memoire d'un systeme embarque a puce electronique, notamment d'une carte a puce, et systeme embarque mettant en oeuvre le procede |
FR2829335A1 (fr) * | 2001-09-06 | 2003-03-07 | St Microelectronics Sa | Procede de brouillage d'un calcul a quantite secrete |
FR2848753B1 (fr) * | 2002-12-11 | 2005-02-18 | Gemplus Card Int | Procede de division entiere ou de reduction modulaire securise contre les attaques a canaux caches |
FR2856537B1 (fr) * | 2003-06-18 | 2005-11-04 | Gemplus Card Int | Procede de contre-mesure par masquage de l'accumulateur dans un composant electronique mettant en oeuvre un algorithme de cryptographie a cle publique |
FR2862454A1 (fr) * | 2003-11-18 | 2005-05-20 | Atmel Corp | Methode de reduction modulaire aleatoire et equipement associe |
WO2006124160A2 (en) * | 2005-05-12 | 2006-11-23 | Atmel Corporation | Randomized modular polynomial reduction method and hardware therefor |
FR2885711B1 (fr) * | 2005-05-12 | 2007-07-06 | Atmel Corp | Procede et materiel modulaire et aleatoire pour la reduction polynomiale |
WO2007000702A2 (en) | 2005-06-29 | 2007-01-04 | Koninklijke Philips Electronics N.V. | Arrangement for and method of protecting a data processing device against a cryptographic attack or analysis |
WO2007000701A2 (en) * | 2005-06-29 | 2007-01-04 | Koninklijke Philips Electronics N. V. | Arrangement for and method of protecting a data processing device against an attack or analysis |
FR2897963A1 (fr) * | 2006-02-28 | 2007-08-31 | Atmel Corp | Procede pour les conjectures de quotient rapide et une manip ulation de congruences |
FR2917197B1 (fr) * | 2007-06-07 | 2009-11-06 | Thales Sa | Procede de masquage du resultat d'une operation de multiplication modulaire et dispositif associe. |
KR101101870B1 (ko) * | 2009-04-14 | 2012-01-05 | 우성태 | 전동 브라인드의 회송장치 |
DE102010064578B3 (de) * | 2010-08-12 | 2015-12-10 | Infineon Technologies Ag | Kryptographie-Prozessor, Chipkarte und Verfahren zur Berechnung eines Ergebnisses einer Exponentiation |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0599141A2 (de) * | 1992-11-24 | 1994-06-01 | MERCK PATENT GmbH | Mittel und Verfahren zur immunologischen Bestimmung von Amiodaron und dessen Metaboliten |
EP0682327A2 (en) * | 1994-05-09 | 1995-11-15 | Yeda Research And Development Company, Ltd. | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
US5991415A (en) | 1997-05-12 | 1999-11-23 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for protecting public key schemes from timing and fault attacks |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4759063A (en) * | 1983-08-22 | 1988-07-19 | Chaum David L | Blind signature systems |
JP3053106B2 (ja) * | 1990-11-02 | 2000-06-19 | 株式会社日立製作所 | 暗号化処理装置、及び復号化処理装置 |
US6064740A (en) * | 1997-11-12 | 2000-05-16 | Curiger; Andreas | Method and apparatus for masking modulo exponentiation calculations in an integrated circuit |
CA2256179C (en) * | 1997-12-17 | 2002-05-07 | Shigenori Uchiyama | Encryption and decryption devices for public-key cryptosystems and recording medium with their processing programs recorded thereon |
WO1999035782A1 (en) * | 1998-01-02 | 1999-07-15 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
CA2885956C (en) * | 1998-05-18 | 2016-07-12 | Giesecke & Devrient Gmbh | Access-protected data carrier |
DE19822217B4 (de) * | 1998-05-18 | 2018-01-25 | Giesecke+Devrient Mobile Security Gmbh | Zugriffsgeschützter Datenträger |
WO1999067919A2 (en) * | 1998-06-03 | 1999-12-29 | Cryptography Research, Inc. | Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
DE69938045T2 (de) * | 1998-06-03 | 2009-01-15 | Cryptography Research Inc., San Francisco | Verwendung von unvorhersagbarer Information zur Leckminimierung von Chipkarten und anderen Kryptosystemen |
JP4317607B2 (ja) * | 1998-12-14 | 2009-08-19 | 株式会社日立製作所 | 情報処理装置、耐タンパ処理装置 |
US6870929B1 (en) * | 1999-12-22 | 2005-03-22 | Juniper Networks, Inc. | High throughput system for encryption and other data operations |
DE19963408A1 (de) * | 1999-12-28 | 2001-08-30 | Giesecke & Devrient Gmbh | Tragbarer Datenträger mit Zugriffsschutz durch Schlüsselteilung |
JP2001308843A (ja) * | 2000-04-19 | 2001-11-02 | Nec Commun Syst Ltd | 暗号復号化装置 |
AU7182701A (en) * | 2000-07-06 | 2002-01-21 | David Paul Felsher | Information record infrastructure, system and method |
-
1999
- 1999-12-28 DE DE19963407A patent/DE19963407A1/de not_active Withdrawn
-
2000
- 2000-12-20 US US10/168,549 patent/US7441125B2/en not_active Expired - Lifetime
- 2000-12-20 WO PCT/EP2000/013029 patent/WO2001048706A1/de active Application Filing
- 2000-12-20 AU AU30151/01A patent/AU3015101A/en not_active Abandoned
- 2000-12-20 CN CNB008178259A patent/CN1180568C/zh not_active Expired - Lifetime
- 2000-12-20 RU RU2002120470/09A patent/RU2280285C2/ru active
- 2000-12-20 ES ES00990805T patent/ES2382615T3/es not_active Expired - Lifetime
- 2000-12-20 KR KR1020027008263A patent/KR100867077B1/ko active IP Right Grant
- 2000-12-20 AT AT00990805T patent/ATE545921T1/de active
- 2000-12-20 EP EP00990805A patent/EP1272984B1/de not_active Expired - Lifetime
- 2000-12-20 JP JP2001548354A patent/JP2003525538A/ja active Pending
-
2002
- 2002-06-13 ZA ZA200204746A patent/ZA200204746B/en unknown
-
2003
- 2003-06-10 HK HK03104061A patent/HK1051928A1/xx not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0599141A2 (de) * | 1992-11-24 | 1994-06-01 | MERCK PATENT GmbH | Mittel und Verfahren zur immunologischen Bestimmung von Amiodaron und dessen Metaboliten |
EP0682327A2 (en) * | 1994-05-09 | 1995-11-15 | Yeda Research And Development Company, Ltd. | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
US5991415A (en) | 1997-05-12 | 1999-11-23 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for protecting public key schemes from timing and fault attacks |
Also Published As
Publication number | Publication date |
---|---|
US20030079139A1 (en) | 2003-04-24 |
US7441125B2 (en) | 2008-10-21 |
RU2280285C2 (ru) | 2006-07-20 |
ZA200204746B (en) | 2003-12-13 |
CN1180568C (zh) | 2004-12-15 |
EP1272984A1 (de) | 2003-01-08 |
WO2001048706A1 (de) | 2001-07-05 |
DE19963407A1 (de) | 2001-07-12 |
EP1272984B1 (de) | 2012-02-15 |
JP2003525538A (ja) | 2003-08-26 |
RU2002120470A (ru) | 2004-02-20 |
CN1415106A (zh) | 2003-04-30 |
HK1051928A1 (en) | 2003-08-22 |
ATE545921T1 (de) | 2012-03-15 |
AU3015101A (en) | 2001-07-09 |
KR20020075877A (ko) | 2002-10-07 |
ES2382615T3 (es) | 2012-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100757353B1 (ko) | 데이터 저장매체, 이를 위한 비밀 데이터 보호 방법 및 암호화된 메세지 형성 방법 | |
CN100390695C (zh) | 更少信息泄露的设备与方法 | |
KR100867077B1 (ko) | 임의의 메세지 부여에 의해 억세스 보호가 이루어지는 휴대형 데이터 저장매체 및 그의 비밀 데이터 보호방법 | |
US7205794B2 (en) | Microprocessor resistant to power analysis | |
JP2019054504A (ja) | エントロピービットを用いたセキュリティシステム | |
US9288038B2 (en) | Access-controlled data storage medium | |
US7065788B2 (en) | Encryption operating apparatus and method having side-channel attack resistance | |
US20110072279A1 (en) | Device and method for securely storing data | |
Tunstall | Smart card security | |
Leng | Smart card applications and security | |
JP4600902B2 (ja) | アクセス保護型データ記憶媒体 | |
JP4065861B2 (ja) | 半導体集積回路 | |
CN110287708A (zh) | 一次性可编程加密装置与其加密方法 | |
RU2263967C2 (ru) | Защищенный от несанкционированного доступа носитель данных, способ выполнения в нем операций, в том числе относящихся к защите данных, и способ защиты конфиденциальных данных | |
Fournaris et al. | Secure Docking Station and its protection against hardware attacks | |
Ramalingam | Mobile code security | |
Bar-El | Information Security Analyst Email: hagai. bar-el@ discretix. com Tel:+ 972-9-8858810 www. discretix. com | |
WALTER | How Secure is your E-Purse against Side Channel Leakage? | |
Mayes et al. | Smart Card Security | |
AU2002348963A1 (en) | Device and method with reduced information leakage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
AMND | Amendment | ||
E902 | Notification of reason for refusal | ||
AMND | Amendment | ||
E601 | Decision to refuse application | ||
AMND | Amendment | ||
J201 | Request for trial against refusal decision | ||
B701 | Decision to grant | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20121017 Year of fee payment: 5 |
|
FPAY | Annual fee payment |
Payment date: 20131018 Year of fee payment: 6 |
|
FPAY | Annual fee payment |
Payment date: 20141030 Year of fee payment: 7 |
|
FPAY | Annual fee payment |
Payment date: 20151026 Year of fee payment: 8 |
|
FPAY | Annual fee payment |
Payment date: 20161026 Year of fee payment: 9 |
|
FPAY | Annual fee payment |
Payment date: 20171019 Year of fee payment: 10 |