REFERENCES
AciiC¸ mez, O. (2007). Yet another MicroArchitectural At-
tack: Exploiting I-cache. In Proc. of the 2007 ACM
workshop on Computer security architecture.
AciiC¸ mez, O., Ko, C¸ . K., and Seifert, J.-P. (2007). On
The Power of Simple Branch Prediction Analysis.
2007 ACM Symposium on Information, Computer
and Communications Security (ASIACCS’07).
AciiC¸ mez, O., Schindler, W., and Ko, C¸ . K. (2007). Cache
Based Remote Timing Attack on the AES. Topics in
Cryptology - CT-RSA 2007 (pp. 271-286.). Springer-
Verlag, LNCS, series 4377.
Alsaid, A., and Mitchel, C. J. (2005). Dynamic content at-
tacks on digital signatures. Information Management
& Computer Security, 4 (13), 328-336.
Backes, M., Datta, A., Derek, A., Mitchell, J. C., Turuani,
M. (2006). Compositional analysis of contract-signing
protocols. Theoretical Computer Science 367, 33-56.
Brumley, D., and Boneh, D. (2003). Remote Timing At-
tacks are Practical. In Proc. of the 12th Usenix Secu-
rity Symposium.
Dasgupta, P., Chatha, K., and Gupta, S. K. S. (2007).
Vulnerabilities of PKI based Smartcards. In Proc. of
the IEEE Military Communications Conference 2007
(MILCOM 2007).
European Directive 1999/93/CE of the European Parliament
and of the Council of 13 December 1999 on a Com-
munity framework for electronic signatures.
Fahn, P., and Pearson, P. (1999). IPA: A New Class of
Power Attacks. In Proc. of CHES 1999 (pp. 173-186).
Springer-Verlag, LNCS, series 1717.
Federal Trade Commission, Department of Commerce,
United States of America. (2000). Electronic Signa-
tures in Global and National Commerce Act.
Gandolfi, K., Mourtel, C., and Olivier, F. (2001). Electro-
magnetic Analysis: Concrete Results. In Proc. of the
Cryptographic Hardware and Embedded Systems (pp.
251-261). Springer-Verlag, LNCS, 2162.
Girard, P., and Giraud, J-L. (2003). Software attacks on
smart cards. Information Security Technical Report,
8 (1), 55-66.
Government of Canada, Department of Justice. (2000). Per-
sonal Information Protection and Electronic Docu-
ments Act.
Hernandez-Ardieta, J. L., Gonzalez-Tablas, A. I., Alvarez,
B. R. (2008). An Optimistic Fair Exchange Protocol
based on Signature Policies. Computers & Security,
27 (7-8), 309 - 322. Elsevier.
Hernandez-Ardieta, J. L., Gonzalez-Tablas, A. I., Ramos,
B. (2009). Formal Validation of OFEPSP+ with
AVISPA. Joint Workshop on Automated Reasoning
for Security Protocol Analysis and Issues in the The-
ory of Security. Springer-Verlag, LNCS. (to appear)
International Organization for Standardization. (1996).
ISO/IEC DIS 13888-1. Information technology - Se-
curity techniques - Non repudiation - Part 1: General
model. ISO/IEC JTC1/SC27 N1503.
International Organization for Standardization. (1997).
ISO/IEC 13888-3 Information technology - Security
techniques - Non repudiation - Part 3: Mechanisms
Using Asymmetric Techniques.
Jøsang, A., Povey, D., and Ho, A. (2002). What You See is
Not Always What You Sign. In Proc. of the Australian
UNIX User Group. Melbourne.
Kain, K. (2003). Electronic Documents and Digital Signa-
tures. Master Thesis.
Kocher, P. C. (1996). Timing attacks on Implementations of
Diffie-Hellman, RSA, DSS and Other Systems. In Ad-
vances in Cryptology - CRYPTO ’96 (pp. 104-113).
Springer-Verlag, LNCS series 1109.
Kocher, P., Jaffe, J., and Jun, B. (1999). Differential Power
Analysis. In Proc. of CRYPTO 1999 (pp. 388-397).
Springer-Verlag, LNCS series 1666.
Kremer, S., Markowitch, O., Zhou, J. (2002). An inten-
sive survey of fair non-repudiation protocols. Com-
puter Communications, 25, 1601-1621.
Le, T-H., Canovas, C., and Clediere, J. (2008). An overview
of side channel analysis attacks. In Proc. of the 2008
ACM Symposium on Information, Computer and
Communications Security (ASIACCS 2008).
Marchesini, J., Smith, S.W., and Zhao, M. (2005). Keyjack-
ing: the surprising insecurity of client-side SSL. Com-
puters & Security, 24 (2), 109-123.
McCullagh, A., and Caelli, W. (2000). Non-repudiation in
the digital Environment. First Monday, 5 (8).
Quisquater, J.-J., and Samyde, D. (2001). ElectroMagnetic
Analysis (EMA): Measures and Counter-measures for
Smart Cards. In Proceeding of the International Con-
ference on Research in Smart Cards (pp. 200-210).
Springer-Verlag, LNCS, 2140.
Scheibelhofer, K. (2001). What You See Is What You Sign -
Trustworthy Display of XML Documents for Signing
and Verification. In Proc. of the IFIP TC6/TC11 In-
ternational Conference on Communications and Mul-
timedia Security Issues of the New Century.
Schindler, W. (2000). A Timing Attack against RSA with
the Chinese Remainder Theorem. In Proc. of the
Cryptographic Hardware and Embedded Systems (pp.
110-125). Springer-Verlag, LNCS, series 1965.
Spalka, A., Cremers, A. B., and Langweg, H. (2002). Trojan
Horse Attacks on Software for Electronic Signatures.
Informatica, 26, 191-203.
Tanaka, H. (2008). Evaluation of Information Leakage
via Electromagnetic Emanation and Effectiveness of
Tempest. IEICE Transactions on Information and Sys-
tems, 91 (5), 1439-1446.
Tiri, K. (2007). Side-channel Attack Pitfalls. In Proc. of the
44th ACM IEEE Design Automation Conference.
United Nations. (2001). UNCITRAL Model Law on Elec-
tronic Signatures with Guide to Enactment.
Zhou, J., and Gollmann, D. (1997). Evidence and Non-
repudiation. Journal of Network and Computer Appli-
cations, 20 (3), 267-281.
SECRYPT 2009 - International Conference on Security and Cryptography
380