[1] |
KOCHER P . Timing attacks on implementAtions of diffie-hellmAn,RSA,DSS,and other systems[C]//CRYPTO 1996. 1996:104-113.
|
[2] |
KOCHER P , JAFFE J , JUN B A . Differential power analysis[C]//Proceedings of the 19th AnnuAl InternAtionAl Cryptology Conference on AdvAnces in Cryptology Lecture Notes In Computer Science. 1999:388-397.
|
[3] |
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[C]//CryptogrAphic HArdwAre And Embedded Sys-tems. 2004:16-29.
|
[4] |
SURESH C , JOSYULA R R , PANKAJ R . Template attacks[C]// Cryp-togrAphic Hardware and Embedded Systems - CHES 2002. 2003:13-28.
|
[5] |
GIERLICHS B , BATINA L , TUYLS P , et al. Mutual information analysis[J]. In CHES 2008,LNCS, 2008:426-442.
|
[6] |
BELLARE M , CANETTI R , KRAWCZYK H . Keying hash functions for message authentication[C]//CRYPTO. 1996:1-15.
|
[7] |
China's office of security commercial code administration:sepecifica-tion of sm3 cryptographic hash function (2010)[EB/OL]. .
|
[8] |
MCEVOY R , TUNSTALL M , COLIN C , et al. Differential power analysis of HMAC based on SHA-2,and countermeasures[J]. Infor-mation Security ApplicAtions, 2007:317-332.
|
[9] |
GUO L M , LI Q , WANG L H , et al. A differential power analysis attack on dynamic password token based on SM3 algorithm[C]//First International Conference on Information Science and Electronic Technology (ISET 2015). 2015:107-110.
|
[10] |
GUO L M , LI Q , WANG L H , et al. A first-order differential power analysis attack on HMAC-SM3[C]//First International Conference on Information Science and Electronic Technology (ISET 2015). 2015:94-97.
|
[11] |
吴震, 陈运, 陈俊 , 等. 真实硬件环境下幂剩余功耗轨迹指数信息提取[J]. 通信学报, 2010,31(2):17-21. WU Z , CHEN Y , CHEN J , et al. Exponential information's extraction from power traces of modulo exponentiation implemented on FPGA[J]. Journal on Communications, 2010,31(2):17-21.
|
[12] |
王敏, 杜之波, 吴震 , 等. 针对 SMS4轮输出的选择明文能量分析攻击[J]. 通信学报, 2015,36(1):2015016. WANG M , DU Z B , WU Z , et al. Chosen-plaintext power analysis at-tack against SMS4 with the round-output as the intermediate data[J]. Journal on Communications, 2015,36(1):2015016.
|