[1] |
国家商用密码管理办公室. 无线局域网产品使用的 SMS4密码算法[EB/OL]. , 2006.National office of business password management. SMS4 cipher algo-rithm for wireless local area network products[EB/OL]. , 2006.
|
[2] |
DAN B , RICHARD A , DEMILLO R , et al. On the importance of checking cryptographic protocols for faults[C]// 1997:1175-1213.
|
[3] |
BIHAM E , SHAMIR A . Differential fault analysis of secret key cryptosystems[J]. Lncs, 1999,1294:513-525.
|
[4] |
JOHANNES , JEAN P S . Fault based cryptanalysis of the advanced encryption standard (AES)[M]. Springer Berlin Heidelberg, 2002:162-181.
|
[5] |
PIRET G , QUISQUATER J J . A differential fault attack technique against spn structures,with application to the AES and khazad[C]//Cryptographic Hardware and Embedded Systems-CHES 2003, International workshop. 2003:77-88.
|
[6] |
KIRCANSKI A , YOUSSEFA M . Differential fault analysis of HC-128[C]//Progress in Cyptology-africacrypt 2010, Third International Conference on Cryptology in Africa, 2010:261-278.
|
[7] |
INGRID B , BERND M , VOLKER M . Differential fault attacks on elliptic curve cryptosystems[M]. Springer Berlin Heidelberg, 2000:131-146.
|
[8] |
张蕾, 吴文玲 . SMS4密码算法的差分故障攻击[J]. 计算机学报, 2006,29(9):1596-1602. ZHANG L , WU W L . Differential fault analysis on SMS4[J]. Chinese Journal of Computers, 2006,29(9):1596-1602.
|
[9] |
LI W , GU D . An improved method of differential fault analysis on the SMS4 cryptosystem[C]//International Symposium on Data Privacy,and E-commerce. 2007:156-180.
|
[10] |
李玮, 谷大武 . 基于密钥编排故障的SMS4算法的差分故障分析[J]. 通信学报, 2008,29(10):135-142. LI P , GU D W . Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule[J]. Journal on Communications, 2008,29(10):135-142.
|
[11] |
LI R L , SUN B , LI C , et al. Differential fault analysis on SMS4 using a single fault[J]. Information Processing Letters, 2011,111(4): 156-163.
|
[12] |
荣雪芳, 吴震, 王敏 , 等. 基于随机故障注入的SM4差分故障攻击方法[J]. 计算机工程, 2016,42(7):129-133. RONG X F , WU Z , WANG M , et al. Differential fault attack method on sm4 based on random fault injection[J]. Computer Engineering, 2016,42(7):129-133.
|
[13] |
ROSS A , MARKUS K . Low cost attacks on tamper resistant devices[C]. Springer, 1997:125-136.
|
[14] |
HAMID C , MICHAEL T . Round reduction using faults[J]. FDTC, 2005,5:13-24.
|