[1] |
KOCHER P C . Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. N Koblitz, editor, CRYPTO[C]. 1996.104-113.
|
[2] |
MANGARD S , OSWALD E , POPP T . Power Analysis Attacks: Revealing the Secrets of Smart Cards[M]. Advances in Information Security.Springer, 2007.
|
[3] |
MEYNARD O , GUILLEY S , DANGER J L , et al. Far correlation-based EMA with a precharacterized leakage model[A]. Design, Automation & Test in Europe Conference & Exhibition (DATE)[C]. 2010.977-980.
|
[4] |
EISENBARTH T , KASPER T , MORADI A , et al. On the power of power analysis in the real world: a complete break of the keeloq code hopping scheme[A]. CRYPTO 2008[C]. 2008.203-220.
|
[5] |
KOCHER P C , JAFFE J , JUN B . Differential power analysis[A]. CRYPTO 1999[C]. 1999.388-397.
|
[6] |
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[A]. M Joyeand J J Quisquater[C]. 2004.16-29.
|
[7] |
邓高明, 赵强, 张鹏 等. 针对密码芯片的电磁频域模板分析攻击[J]. 计算机学报, 2009,32(4):602-610. DENG G M , ZHAO Q , ZHANG P , et al. EM frequently domain template analysis on cipher chips[J]. Chinese Journal of Computers, 2009,32(4):602-610.
|
[8] |
BATINA L , GIERLICHS B , PROUFF E , et al. Mutual information analysis: a comprehensive study[J]. Journal of Cryptology, 2011,24(2):269-291.
|
[9] |
DPA Contest[EB/OL]. .
|
[10] |
HENNESSY L , PATTERSON A 著, 白跃彬译. 计算机系统结构-量化研究方法(第四版)[M]. 北京: 电子工业出版社, 2007. HENNESSY L , PATTERSON A , BAI Y B . Computer Architecture: A Quantitative ApproachFourth Edition[M]. Beijing: Publishing House of Electronics Industry, 2007.
|
[11] |
MANGARD S , OSWALD E , POPP T 著, 冯登国 等译. 能量分析攻击[M]. 北京: 科学出版社, 2010. MANGARD S , OSWALD E , POPP T , FENG D G . Power Analysis Attacks[M]. Beijing: Science Press, 2007.
|
[12] |
吴文玲, 冯登国, 张文涛 . 分组密码的设计与分析(第2版)[M]. 北京: 清华大学出版社, 2009. WU W L , FENG D G , ZHANG W T . Design and Analysis of Block Cipher[M]. Beijing: Tsinghua University Press, 2009.
|
[13] |
张鹏, 邓高明, 陈开颜 等. 针对AES密码芯片的远场相关性电磁分析攻击[J]. 华中科技大学学报(自然科学版), 2009,37(8):31-34. ZAHNG P , DENG G M , CHEN K Y , et al. Electromagnetic correlation analysis attacks on microcontroller implementations of AES in far field[J]. Journal of Huazhong University of Science and Technology(Natural Science Edition), 2009,37(8):31-34.
|