期刊文献+

GNSS授权接收机防破解设计

The Anti-cracking Design of GNSS Authorized Satellite Receiver
下载PDF
导出
摘要 通过剖析接收机内部信息流,明确了GNSS授权接收机中需要进行安全防护的各类信息及相应的部件,结合当前国内外芯片破解技术的进展,归纳出了GNSS授权接收机安全防护措施和安全性能评估方法,为授权接收机设计提供了参考。
出处 《测绘通报》 CSCD 北大核心 2016年第1期72-75,共4页 Bulletin of Surveying and Mapping
  • 相关文献

参考文献9

  • 1POZZOBON O, WULLEMS C, DETRATFI M. Security Considerations in the Design of Tamper Resistant GNSS Receivers [ C ]//Proceedings of 2010 5th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Proceeding (NAVITEC). Noordwijk : IEEE, 2010.
  • 2SKOROBOGATOV S P. Semi-invasive Attacks: A New Approach to Hardware Security Analysis [ D ]. Cam- bridge: University of Cambridge, 2005.
  • 3KOCHER P C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems ~ C ]// KOBLITZ N. Advances in Cryptology-CRYPTO'96.Berlin Heidelberg : Springer-Verlag, 1996 : 104-113.
  • 4DHEM J F, KOEUNE F, LEROUX P A, et al. A Prac- tical Implementation of the Timing Attack [ C ] // QUISQUATER J J, SCHNEIER B. Smart Card Research and Applications. Berlin Heidelberg: Springer, 1998: 167-182.
  • 5易青松,戴紫彬.SoC安全芯片物理级攻击方法及安全防护探析[J].国外电子元器件,2007(5):23-26. 被引量:6
  • 6温圣军,张鲁国.安全芯片错误诱导攻击防护方案[J].计算机工程,2009,35(17):135-137. 被引量:2
  • 7王红胜,宋凯,张阳,陈开颜.针对高级加密标准算法的光故障注入攻击[J].计算机工程,2011,37(21):97-99. 被引量:4
  • 8邓高明,赵强,张鹏,陈开颜,刘晓芹.针对密码芯片的电磁频域模板分析攻击[J].计算机学报,2009,32(4):602-610. 被引量:16
  • 9国家密码管理局.安全芯片密码检测准则:GM/T0008.2012[S].北京:中国标准出版社,2012.

二级参考文献33

  • 1谢满德,沈海斌,竺红卫.对智能卡进行微分功耗分析攻击的方法研究[J].微电子学,2004,34(6):609-613. 被引量:3
  • 2赖坤锋.智能卡SPA&DPA攻击[J].现代电子技术,2005,28(17):28-29. 被引量:3
  • 3韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 4韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 5Quisquater J J, Samyde D. Electromagnetic analysis (EMA): Measures and countermeasures for smart cards// Proceedings of the Smart Cards Programming and Security (e-Smart 2001). Cannes, France, 2001: 200-210
  • 6Gandolfi K, Mourtel C, Olivier F. Electromagnetic analysis: Concrete results//Proceedings of the Workshop on Crypto graphic Hardware and Embedded Systems (CHES'01). Paris, France, 2001:251-261
  • 7Agrawal D, Archambeault B, Rao J R, Rohatgi P. The EM side channel(s): Attacks and assessment methodologies// Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'02). Redwood Shores, CA, USA, 2002:29-45
  • 8Chari S, Rao J R, Rohatgi P. Template attacks//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES' 03). Cologne, Germany, 2003 13-28
  • 9Agrawal D, Rao J R, Rohatgi P, Schramm K. Templates as master keys//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES' 05). Edinburgh, UK, 2005: 15-29
  • 10Archambeau C, Peeters E, Standaert F X, Quisquater J J. Template attacks in principal subspaces//Proeeedings of the Workshop on Cryptographie Hardware and Embedded Systems (CHES'06). Yokohama, Japan, 2006, 1-14

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部