4. International Organization for Standardization: Information technology – Identification cards
– Integrated circuit(s) cards with contacts – Part 4: Interindustry comands for interchange.
(ISO)
5. Muir, J.A.: Techniques of Side Channel Cryptanalysis. Master’s thesis, University of Water-
loo, Ontario, Canada (2001) Master of Mathematics in Combinatorics and Optimization.
6. Kocher, P.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems.
In: Proceedings of the 16th Annual International Cryptology Conference on Advances in
Cryptology, Springer-Verlag (1996) 104–113
7. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Proceedings of the 19th
Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag
(1999) 388–397
8. Coron, J.S., Kocher, P., Naccache, D.: Statistics and Secret Leakage. In: Proceedings of
Financial Cryptography (FC2000). Volume 1962 of Lecture Notes in Computer Science.,
Springer-Verlag (2001) 157–173
9. Quisquater, J.J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Countermea-
sures for Smart Cards. In: Proceedings of E-smart 2001. Volume 2140 of Lecture Notes in
Computer Science., Springer-Verlag (2001) 200–210
10. Gandol, K., Mourtel, C., Olivier, F.: ElectroMagnetic Analysis: Concrete Results. In: Pro-
ceedings of CHES’2001. Volume 2162 of Lecture Notes in Computer Science., Springer-
Verlag (2001) 251–261
11. Kömmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Proces-
sors. In: Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard ’99),
Chicago, Illinois, USA (1999) 9–20
12. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer’s Apprentice
Guide to Fault Attacks. In: Proceedings of Workshop on Fault Detection and Tolerance in
Cryptography, Italy (2004)
13. Giraud, C., Thiebeauld, H.: A survey on fault attacks. In: Proceedings of CARDIS’04,
Smart Card Research and Advanced Applications VI, Toulouse, France, Kluwer academic
publisher (2004) 159–176
14. Skorobogatov, S., Anderson, R.: Optical Fault Induction Attacks. In: Proceedings of Work-
shop on Cryptographic Hardware and Embedded Systmes (CHES 2002), San Francisco Bay
(Redwood City), USA (2002)
15. GlobalPlatform: GlobalPlatform. (http://www.globalplatform.org/)
16. Rose, E., Rose, K.: Lightweight bytecode verification. In: In Workshop on Fundamental
Underpinnings of Java, OOPSLA ’98 Workshop., Vancouver, Canada (1998)
17. Casset, L., Burdy, L., Requet, A.: Formal Development of an embedded verifier for Java Card
Byte Code. In: Proceedings of the IEEE International Conference on Dependable Systems
& Networks, Washington, D.C., USA (2002)
18. Leroy, X.: On-Card Bytecode Verification for Java Card. In: Proceedings of the International
Conference on Research in Smart Cards, E-Smart 2001, Springer-Verlag (2001) 150–164
19. Leroy, X.: Bytecode verification on Java smart cards. Software-Practice & Experience 32
(2002) 319–340
20. Cohen, R.M.: Defensive Java Virtual Machine Version 0.5 alpha. (1997)
21. Barthe, G., Dufay, G., Jakubiec, L., Melo de Sousa, S.: A Formal Correspondence between
Offensive and Defensive JavaCard Virtual Machines. In: Proceedings of VMCAI’02. Volume
2294 of Lecture Notes in Computer Science., Venice, Italy, Springer-Verlag (2002) 32–45
22. Deville, D., Grimaud, G.: Building an “impossible” verifier on a Java Card. In: 2
nd
USENIX
Workshop on Industrial Experiences with Systems Software, Boston, USA (2002)
23. Montgomery, M., Krishna, K.: Secure Object Sharing in Java Card. In: Proceedings of
the USENIX Workshop on Smartcard Technology (Smartcard ’99), Chicago, Illinois, USA
(1999)
340