SPARKS,EVAN R.A security assessment of trustedplatform modules[EB/OL].Dartmouth:ComputerScience Technical Report[2011-01-15].http:∥www.cs.dartmouth.edu/~pkilab/sparks/thesis.ps.
[4]
Trusted Computing Group.TCG platform reset attackmitigation specification version 1[EB/OL].[2011-01-15].http:∥www.trusted-computinggroup.org/files/temp/6452209B-1D09-3519-AD815636FC36C5CF/Platform%20Reset%20Attack%20Mitigation%20Specification.pdf.
[5]
KLAUS K,DRIES S,BART P.Analyzing trusted platformcommunication[EB/OL].[2011-01-15].http:∥www.cosic.esat.kuleuven.be/publications/article-591.pdf.
[6]
张涛.面向密码芯片的旁路攻击关键技术研究[D].成都:电子科技大学计算机科学与工程学院,2009.ZHANG Tao.The research on the key technologies of side-channel attack oriented to cryptographic chips[D].Chengdu:School of Computer Science and Engineering,University of Electronic Science and Technology of China,2009.(in Chinese)
[7]
李海军.加密芯片的旁道攻击防御对策研究[D].哈尔滨:哈尔滨工程大学计算机科学与技术学院,2010.LI Hai-jun.Research on side channel attackcountermeasures of encryption chip[D].Harbin:Collegeof Computer Science and Technology,Harbin EngineeringUniversity,2010.(in Chinese)
[8]
DAVID C,KENT Y,RYAN C,et al.A practical guide totrusted computing[M].Lebanon:IBM Press,2007:1-35.
周巢尘.通信协议的设计[J].计算机学报,1983(5):321-329.ZHOU Chao-chen.A rigorous approach to the design ofprotocols[J].Chinese Journal of Computers,1983(5):321-329.(in Chinese)
[16]
HOARE C A R,ZHOU Chao-chen.Communicatingsequential processes[M].Beijing:Beijing PekingUniversity Press,1990:10-50.