Check out the new USENIX Web site.
...
This research was supported in part by the Defense Advanced Research Projects Agency under contract F119628-93-C-0193, IBM, U.S. Department of Energy under Contract No. W-7405-ENG-36, the US Postal Service, and Visa International. Howard Gobioff was supported in part by a National Science Foundation Graduate Fellowship. Sean Smith performed this research at Los Alamos National Laboratory. The views and conclusions in this document are those of the authors and do not necessarily represent the official policies or endorsements of the US Government, its agencies, or any of the research sponsors.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...protocol
Tamper resistance is more difficult than it appears at first. Anderson and Kuhn[2] have show how to break a purportedly secure device. Kocher[9] has shown how to use timing attacks to discover RSA keys. And Boneh, DeMillo, and Lipton[4] have shown that a smart card performing the same encryption twice is vulnerable if an opponent can induce processor failures through a hostile environment (radiation, temperature extremes, etc.).
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...designs
Please note there are some examples of smart cards that provide these I/O operations - such as the VISA/Toshiba Super Smart Card.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

TOM Comversion
Fri Oct 4 17:57:09 EDT 1996