<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>bujse</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Beykent Üniversitesi Fen ve Mühendislik Bilimleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1307-3818</issn>
                                        <issn pub-type="epub">1307-3826</issn>
                                                                                            <publisher>
                    <publisher-name>Beykent University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="en">
                                    <trans-title>A CHRONOLOGICAL REVIEW ON TEMPEST ATTACKS IN DATA SECURITY</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>VERİ GÜVENLİĞİNDE TEMPEST SALDIRI TÜRLERİ ÜZERİNE TARİHSEL BİR İNCELEME</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                <name>
                                    <surname>Altıner</surname>
                                    <given-names>Hamdi</given-names>
                                </name>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                <name>
                                    <surname>Altıner</surname>
                                    <given-names>Hamdi</given-names>
                                </name>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                <name>
                                    <surname>Şaykol</surname>
                                    <given-names>Ediz</given-names>
                                </name>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                <name>
                                    <surname>Şaykol</surname>
                                    <given-names>Ediz</given-names>
                                </name>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20150506">
                    <day>05</day>
                    <month>06</month>
                    <year>2015</year>
                </pub-date>
                                        <volume>6</volume>
                                        <issue>2</issue>
                                        <fpage>121</fpage>
                                        <lpage>152</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20150506">
                        <day>05</day>
                        <month>06</month>
                        <year>2015</year>
                    </date>
                                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2007, Beykent University Journal of Science and Engineering</copyright-statement>
                    <copyright-year>2007</copyright-year>
                    <copyright-holder>Beykent University Journal of Science and Engineering</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="en">
                            <p>As an inevitable part of our life, computers sometimes can be used like a nonfirearm unconsciously by ourselves or by malicious people. By disclosingillegally obtained information, worldwide chaoses can be created, security ofcountries can be endangered, vital services like health, electricity,communication can be interrupted, companies can be undermined andviolating privacy of prive life and like a growing network all humanitybecomes vulnerable against this threats.These threats continue in increasing speed and complexity, and will last aslong as information technology takes place in our life. The efforts for securinginformation security must be up to date activity with long lasting andcontinuous improvements. Therefore Information Security must be consideredas a never ending process.In comparison with personnel information security, institutional informationsecurity is much more complex and hard to manage process. Therefore itrequires higher costs and manpower. IT Security consist of many main andsub topics but especially in security related institutions TEMPEST comes atthe head of main precautions. Nowadays on which Information Security&#039;svalue increased, importance of TEMPEST issue became more evident.</p></trans-abstract>
                                                                                                                                    <abstract><p>Hayatımızın bir vazgeçilmezi haline gelen bilgisayarlar, günümüzde bazen farkında olmadan kendimiz bazen de kötü niyetli kişiler tarafından çok etkin bir ateşsiz silah olarak kullanılabilmektedir. Gayri yasal yollarla elde edilen bilgilerin ifşa edilmesi ile dünya çapında kaoslar oluşturulmakta, ülke güvenlikleri tehlikeye atılmakta, sağlık, elektrik, haberleşme hizmetleri gibi hayati faaliyetler durdurulmakta, şirketler zarara uğratılmakta ve özel hayatın gizliliği ihlal edilerek, hızla büyüyen bir ağ gibi tüm insanlık bu tehditlere karşı savunmasız hale gelmektedir. Bu tehditler artan hız ve karmaşıklıkta devam etmekte olup bilişim hayatımızın içerisinde yer aldığı sürece de devam edecektir. Bilişim güvenliğinin sağlanmasına yönelik çabalar bitmeyen ve devamlı iyileştirmeler ile güncel tutulması gereken bir faaliyet olmalıdır. Bu nedenle bilişim güvenliği bir son durum değil, hiç bitmeyen, yaşayan bir süreç olarak algılanmalıdır. Kişisel bilişim güvenliğine kıyasla kurumsal bilişim güvenliği daha çok bileşenli, önemli ve yönetimi zor bir süreçtir. Bu nedenle daha yüksek bir maliyet ve iş gücü gerektirir. Bilişim güvenliği pek çok ana ve alt konulardan meydana gelmektedir ancak özellikle gizli bilgilerin işlendiği kurumlarda uyulması gereken güvenlik önlemlerinin başında TEMPEST gelmektedir. Bilgi güvenliğinin değerini artırdığı günümüzde TEMPEST konusunun önemi daha da belirginleşmiştir.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>TEMPEST</kwd>
                                                    <kwd>   Bilişim Güvenliği</kwd>
                                                    <kwd>   Elektromanyetik Girişim</kwd>
                                                    <kwd>   Elektromanyetik Güvenlik</kwd>
                                                    <kwd>   Elektromanyetik Uyum</kwd>
                                                    <kwd>   Elektronik İstihbarat</kwd>
                                                    <kwd>   Uzaysal Işıma</kwd>
                                                    <kwd>   Ekranlama</kwd>
                                                    <kwd>   Yan Kanal Saldırıları</kwd>
                                                    <kwd>   Elektromanyetik Analiz</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="en">
                                                    <kwd>TEMPEST</kwd>
                                                    <kwd>  Bilişim Güvenliği</kwd>
                                                    <kwd>  Elektromanyetik Girişim</kwd>
                                                    <kwd>  Elektromanyetik Güvenlik</kwd>
                                                    <kwd>  Elektromanyetik Uyum</kwd>
                                                    <kwd>  Elektronik İstihbarat</kwd>
                                                    <kwd>  Uzaysal Işıma</kwd>
                                                    <kwd>  Ekranlama</kwd>
                                                    <kwd>  Yan Kanal Saldırıları</kwd>
                                                    <kwd>  Elektromanyetik Analiz</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">JMcNamara,   &#039;&#039;The   Complete,   Unofficial  TEMPEST   Information   Page&quot;,  at  http://www.eskimo.com/~joelm/tempest.html.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Major General  RFH Nalder,  &#039;History  of the  Royal  Corps  of  Signals&#039;,  published  by the  Royal  Signals  Institution  (1958).</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">USA National  Security Agency  (NSA), TEMPEST:  A signal  problem;  Cryptologic  Spectrum,  1972.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Ulusal  Elektronik  ve  Kriptoloji  Araştırma  Enstitüsü  Dergisi   Cilt:2   Sayı:3    &quot;TEMPEST,     TEMPEST&#039;in     Keşfi    ve     Sinyal     Analizi,     Değerlendirme   Kriterleri   ve   Ölçüm   Sistemleri,   Cihaz   Tasarımı&quot;.   Mayıs-Ağustos  2010.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">W Ware,  &#039; Security Controls for Computer  Systems: Report of Defense Science Board Task Force on Computer  Security&#039;,  Rand Report  R609-1,   The  RAND  Corporation,  Santa  Monica,  CA  (Feb  1970),  available  from  http://csrc.nist.gov/publications/history/index.html.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">P   Wright,   &#039;Spycatcher-The   Candid   Autobiography   of   a   Senior   Intelligence  Officer&#039;,William  Heinemann  Australia,   1987,  ISBN  0-85561-098-0</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">W  Van  Eck,  &#039;&#039;Electromagnetic  Radiation  from Video  Display  Units:  An  Eavesdropping  Risk?  in  Computers  and  Security  v  4  (1985)  pp  269-286.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">RJ Anderson, MG Kuhn,  &#039; &#039;Tamper Resistance-a  Cautionary Note&quot;,  in  Proceedings    of    the    Second    Usenix    Workshop    on    Electronic    Commerce                   (Nov                   96)                   pp                   1-11;                   http://www.cl.cam.ac.uk/users/rja14/tamper.html.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">P  Kocher,  &#039;&#039;Timing  Attacks  on  Implementations  of  Diffie-Hellman,  RSA,  DSS,  and  Other  Systems&quot;,  in  Advances  in  Cryptology-Crypto  96  Springer  LNCS  v  1109 pp  104-113,  1996</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">MG  Kuhn,  RJ  Anderson,  &#039;&#039;Soft Tempest:  Hidden  Data  Transmission  Using  Electromagnetic  Emanations&quot;,  in  Proceedings  of  the  Second  International  Workshop  on  Information  Hiding  (Portland,  Apr  98),  Springer  LNCS  v  1525 pp  126-143.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">P    Kocher,     &#039;&#039;Differential    Power    Analysis&quot;,     in    Advances     in     Cryptology-Crypto  99  Springer  LNCS  v  1666  pp  388-397;  a  brief  version was  presented  at the  rump  session  of Crypto  98.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">MG   Kuhn,   &#039;&#039;Optical   Time-Domain   Eavesdropping   Risks   of   CRT   Displays&quot;  in IEEE  Symposium  on  Security  and  Privacy  (2002)</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">D   Asonov,   R   Agrawal,   &#039;&#039;Keyboard   Acoustic   Emanations&quot;,   IBM   Almaden  Research  Center,  2004.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">L   Zhuang,   F  Zhou,   JD   Tygar,   &#039;&#039;Keyboard   Acoustic   Emanations   Revisited&quot;     in      12th     ACM     Conference     on     Computer     and     Communications  Security  (2005).</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">SJ Murdoch,  &#039;&#039;Hot  or Not:  Revealing Hidden  Services  by their  Clock  Skew&quot;,  in  13th ACM  Conference  on  Computer  and  Communications  Security.  2006</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Ross    Anderson    &quot;Security    Engineering:    A    Guide    to    Building    Dependable   Distributed    Systems&quot;    Second   Edition,    Chapter    17,    Emission  Security,  Cambridge,  January  2008.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">USA  Air  Force,  Emissoin  Security  Countermeasures  Reviews;  USA  Air  Force  Systems  Security  Security Memorandum  7011,  1998.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">R  Gonggrijp,  WJ  Hengeveld,   A  Bogk,   D  Engling,   H  Mehnert,   F   Rieger,   P   Scheffers,  B  Wels,   &#039;&#039;Nedap/Groenendaal   ES3B   voting   computer-a           security           analysis&quot;,           Oct           2006,           at           http://www.wijvertrouwenstemcomputersniet.nl/Nedap-en</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">L.  Ordu,  S.  B.  Ors,  &quot;Yan  Kanal  Analizi  Saldirilarina  Genel  Bakis&quot;,  Ulusal  Elektronik  Imza  Sempozyumu  Bildiriler  Kitabi,  sayfa:  242-249,  07-08  Aralık  2006.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Anderson,   R.,  Kuhn,  M.,  Tamper  resistance   -   a  cautionary   note,   Proceedings  of the 2nd USENIX Workshop  on Electronic  Commerce,  1-11,  1996.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Kommerling,   O.   ve   Kuhn,   M.G.,   Design   principles   for   tamper   resistant  smartcard  processors,  Workshop  on  Smartcard  Technology  1999</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Boneh,  D.,  DeMillo,  R.A.,  Lipton  R.J.,  On the  importance  of   checking  cryptographic protocols for faults, EUROCRYPT&#039;97,  vol  1233,  37-51,  1997</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Joye  M.,  Lenstra  A.K.  and  Quisquater  J.-J,  Chinese   remaindering   based  cryptosystem  in the  presence  of  faults.  Journal  of  Cryptology,  4(12),  241-245,  1999.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Örs,  S.B.,  Hardware  Design  Of  Elliptic  Curve  Cryptosystems   And   Side-Channel  Attacks.  PhD  thesis,  Katholieke  Universiteit  Leuven,  Faculteit  Toegepaste  Wetenschappen,  Departement  Elektrotechniek,  Kasteelpark    Arenberg     10,    3001    Leuven    (Heverlee),    Belgium,    February  2005.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">D  Brumley,   D  Boneh,   &#039;&#039;Remote  timing  attacks  are  practical&quot;,   in   Computer Networks  v 48 no  5 (Aug  2005) pp  701-716</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Dhem  J.F.,  Design  of an  effcient public-key  cryptographic  library  for  RISC-based  smart cards. PhD thesis, UCL  Crypto Group,  Laboratoire  de   microelectronique  (DICE),  May  1998.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Walter  C.D.,  Montgomery  exponentiation  needs  no  final  subtraction.  Electronic  letters,  35(21)  1831-1832,  October  1999.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Walter    C.D.,    MIST:    An    efficient,   randomized    exponentiation    algorithm  for  resisting  power  analysis.  vol  2271  of  Lecture  Notes  in  Computer  Science,  pages  53-66,  San  Jose,  USA,  February  2002.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Hachez  G.  and  Quisquater  J.-J..  Montgomery  exponentiation  with  no  final  subtractions:   Improved   results.   In   C.   K.   Koç   and   C.   Paar,   editors,Proceedings  of 2nd  International  Workshop  on  Cryptographic  Hardware  and  Embedded  Systems  (CHES),  vol  1965  pages  293-301,  Worcester,  Massachusetts,  USA,  August  17-18  2000.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">TS  Messergues,   EA  Dabish,  RH   Sloan,   &#039;&#039;Investigations   of  Power  Analysis  Attacks  on  Smartcards&quot;,  in  Usenix Workshop  on  Smartcard  Technology,  pp  151-161</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">R  Meyer-Sommer,  &#039;&#039;Smartly  analyzing  the  simplicity  and  the  power  of      simple    power    analysis    on    Smartcards&quot;,    in   Workshop    on    Cryptographic  Hardware  and  Embedded   Systems   (2000);   Springer LNCS  v  1965 pp  78-92</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Kang   S.-M.,  and  Leblebici  Y.,  CMOS  Digital  Integrated   Circuits:   Analysis  and  Design.  McGraw  Hill,  2002.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Kocher,    P.,   Jaffe,   J.   ve   Jun,   B.,   Differential   power    analysis,    CRYPTO&#039;99,  vol.  1666,  388-397,  1999.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Ordu L., AES Algoritmasının FPGA Üzerinde Gerçeklenmesi  ve  Yan-Kanal   Analizi   Saldırılarına   Karşı   Güçlendirilmesi.   Yüksek   Lisans   Tezi,  İTÜ  Fen  Bilimleri  Enstitüsü,  Haziran  2006.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Oswald    E.,    On    Side-Channel    Attacks    and   the   Application    of    Algorithmic  Countermeasures.  PhD  Thesis.  June  2003.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">J       Quisquater,        D        Samyde,        &#039;&#039;ElectroMagnetic        Analysis        EMA):Measures     and    Counter-Measures    for    Smart    Cards&quot;    in    nternational  Conference  on Research  in  Smart  Cards,  Springer  LNCS  v2140  pp  200-210.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">Messerges  T.S.,  Power  Analysis  Attacks  and  Countermeasures   on   Cryptographic  Algorithms.  PhD  thesis,  University  of Illinois,  2002.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">Borst  J., Block  Ciphers:  Design,  Analysis  and  Side-Channel  Analysis.  PhD thesis,  K.U.Leuven,  September  2001.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">Şadi  Evren  ŞEKER,  DES  (Veri  Şifreleme  Standardı,  Data  Encryption  Standard),          http://www.bilgisayarkavramlari.com/2008/03/13/des-veri-sifreleme-standardi-data-encryption-standard/              (25.07.2013              arihinde  erişilmiştir.)</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">Chari,   S.,   Jutla   C.S.,   Rao,   J.R.   ve   Rohatgi,   P.,   Towards   sound   approaches    to    counteract    power-analysis    attacks,    CRYPTO&#039;99,    v1666,  398-412,  1999</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">Goubin,   L.  ve  Patari,  J.,  DES  and  differential  power  analysis   the   &quot;duolication&quot;  method,  CHES-1999,  vol.  1717,  158-172.  1999.</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">Akkar,  M.L.  ve  Giraud,  C.,  An  implementation  of  DES  and  AES,  ecure    against    some    attacks,    CHES    2001,    Third    International    Workshop.,  vol.  2162,  309-318,  2001</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">Oswald,  E., Mangard,  S., Pramstaller,  N.,  Rijmen,  V.,  A  side-channel  analysis  resistant  description  of the AES  S-Box, FSE  2005,  vol.  3557,  2005</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">MG   Kuhn,   &#039;&#039;Electromagnetic   Eavesdropping   Risks   of   Flat-Panel   Displays&quot;,                     in                    PET                    2004, at http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">S  Krempl,  &#039;&#039;Lauschangriff  am  Geldautomaten&quot;,  in  Der  Spiegel  Jan  8  1999; at http://web.archive.org/web/20001031024042/http://www.spiegel.de/netzwelt/technologie/0,1518,13731,00.html.</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">ER  Koch,  J  Sperber,  &#039;Die Datenmafia&#039;, Rohwolt  Verlag  (1995)  ISBN  3-499-60247-4</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">US Army,  &#039;Electromagnetic  Pulse  (EMP)  and Tempest  Protection  for  Facilities&#039;,  Corps of Engineers Publications  Depot, Hyattsville  (1990).</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">Halil  Tosunoğlu,   Ortak  Kriterler  ve  Bilgi  Güvenliği,  TÜBİTAK   -BİLGEM        -UEKAE         24        Haziran         2011,         ANKARA         https://www.bilgiguvenligi.gov.tr/dokuman-yukle/6.-kamu-kurumlari-bilgi-teknolojileri-guv.-konf./halil-tosunoglu-8haziranbilgiguvenligigunu/download.html,         (        14.08.2013        tarihinde        erişilmiştir.)</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">D  Boneh,  RA  Demillo,  RJ  Lipton,  &#039;&#039;On  the  Importance  of  Checking  Cryptographic   Protocols  for  Faults&quot;,   in  Advances   in   Cryptology-Eurocrypt  97,  Springer  LNCS  v  1233 pp  37-51.</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">E  Biham,   A   Shamir,   &#039;&#039;Differential  Fault  Analysis   of   Secret   Key   Cryptosystems&quot;,   in  Advances   in   Cryptology-Crypto   97   Springer   LNCS  v  1294 pp  513-525.</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">J   Loughry,   DA   Umphress,    &#039;&#039;Information   leakage   from   optical   emanations&quot;,   in   ACM   Transactions   on   Information   and   System   Security  v  5 no  3 (Aug  2002) pp  262-289</mixed-citation>
                    </ref>
                                    <ref id="ref52">
                        <label>52</label>
                        <mixed-citation publication-type="journal">DX  Song,  D Wagner,  XQ  Tian,  &#039;&#039;Timing  analysis  of  keystrokes  and  SSH  timing   attacks,&quot;   in   Proceedings   of   10th   USENIX   Security   Symposium  (2001).</mixed-citation>
                    </ref>
                                    <ref id="ref53">
                        <label>53</label>
                        <mixed-citation publication-type="journal">SP   Skorobogatov,    &#039;&#039;Optically   Enhanced   Position-Locked    Power    Analysis&quot;,  in CHES  2006 pp  61-75</mixed-citation>
                    </ref>
                                    <ref id="ref54">
                        <label>54</label>
                        <mixed-citation publication-type="journal">Wenhan  Yang,  Yinghua  Lu,  Jun  Xu,  &quot;Video  information  recovery  from  EM  leakage  of  computers  based  storage  oscilloscope&quot;  Beijing  2010.</mixed-citation>
                    </ref>
                                    <ref id="ref55">
                        <label>55</label>
                        <mixed-citation publication-type="journal">Yang  X  N,  Lou  C  Y,  Xu  J  L.  Theory  and  Application  of  Software  Radio.  Beijing:  Publishing  House  of  Electronics  Industry,  2001  (in  Chinese)</mixed-citation>
                    </ref>
                                    <ref id="ref56">
                        <label>56</label>
                        <mixed-citation publication-type="journal">Zhang  H  X,  Lu  Y  H,  He  P  F,  Wang  H  X.  Text  recovery  from  EM  leakage   of  computers.   Journal   of   Southwest   Jiaotong   University,   2007,  42(6):  653-658  (in  Chinese).</mixed-citation>
                    </ref>
                                    <ref id="ref57">
                        <label>57</label>
                        <mixed-citation publication-type="journal">Xiang  C  B,  Zhang  H  Z,  Song  J  Z,  Qiao  S.  Automatic  synchronous  signal    extraction    and    steady    display    of    non    standard    video    information.  Journal  of Data  Acquisition &amp; Processing, 2007, 22 (4): 486-490 (in Chinese).</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
