[1] |
KOCHER P C , . Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[C]// International Cryptology Conference on Advances in Cryptology. Springer, 1996: 104-113.
|
[2] |
肖国镇, 白恩健, 刘晓娟 . AES 密码分析的若干新进展[J]. 电子学报, 2003,31(10): 1549-1554.
|
|
XIAO G Z , BAI E J , LIU X J . Some new developments on the cryptanalysis of AES[J]. ACTA Electronica sinica, 2003,31(10): 1549-1554.
|
[3] |
KOCHER P C , JAFFE J , JUN B . Differential power analysis[C]// International Cryptology Conference on Advances in Cryptology. Springer, 1999: 388-397.
|
[4] |
TANG M , QIU Z L , GUO Z P ,et al. A generic table recomputation-based higher-order masking[J]. IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems, 2017,36(11): 1779-1789.
|
[5] |
PAMMU A A , CHONG K S , NE K Z L ,et al. High secured low power multiplexer-LUT based AES S-box implementation[C]// International Conference on Information Systems Engineering. Springer, 2016: 3-7.
|
[6] |
黄海, 冯新新, 刘红雨 ,等. 基于随机加法链的高级加密标准抗侧信道攻击对策[J]. 电子与信息学报, 2019,41(2): 348-354.
|
|
HUANG H , FENG X X , LIU H Y ,et al. Random addition-chain based countermeasure against side-channel attack for advanced encryption standard[J]. Journal of Electronics & Information Technology, 2019,41(2): 348-354.
|
[7] |
AHN S , CHOI D . An improved masking scheme for S-box software implementations[C]// 16th International Workshop on Information Security Applications. KISSC, 2016: 200-212.
|
[8] |
NASSAR M , SOUISSI Y , GUILLEY S ,et al. RSM:a small and fast countermeasure for AES,secure against 1st and 2nd-order zero-offset SCAs[C]// Design,Automation & Test in Europe Conference & Exhibition. IEEE, 2012: 1173-1178.
|
[9] |
HUANG H , LIU L B , HUANG Q H ,et al. Low area-overhead low-entropy masking scheme (LEMS) against correlation power analysis attack[J]. IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems, 2019,38(2): 208-219.
|
[10] |
CHARI S , JUTLA C S , RAO J R ,et al. Towards sound approaches to counteract power-analysis attacks[C]// International Cryptology Conference on Advances in Cryptology. Springer, 1999: 398-412.
|
[11] |
FAHN P N , PEARSON P K . IPA:a new class of power attacks[C]// International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 1999: 173-186.
|
[12] |
ITOH K , TAKEBAKA M , TORII N . DPA countermeasure based on the "masking method"[C]// International Conference Seoul on Information Security and Cryptology. Springer, 2001: 440-456.
|
[13] |
YAMASHITA N , MINEMATSU K , OKAMURA T ,et al. A smaller and faster variant of RSM[C]// Design,Automation and Test in Europe Conference and Exhibition. IEEE, 2014: 205-209.
|
[14] |
徐佩 . 智能卡AES加密模块抗侧信道攻击掩码技术研究与实现[D]. 重庆:重庆大学, 2015: 20-37.
|
|
XU P . Research and implementation with mask technology on AES encryption module of smartcard against side channel attack[D]. Chongqing:Chongqing University, 2015: 20-37.
|
[15] |
BHASIN S , BRUNEAU N , DANGER J L ,et al. Analysis and improvements of the DPA contest v4 implementation[C]// International Conference on Security,Privacy,and Applied Cryptography Engineering. Springer, 2014: 201-218.
|
[16] |
LEUNG Y W , WANG Y . An orthogonal genetic algorithm with quantization for global numerical optimization[J]. IEEE Transactions on Evolutionary Computation, 2002,5(1): 41-53.
|
[17] |
李濛 . 基于FPGA的AES算法优化与实现[D]. 哈尔滨:黑龙江大学, 2018: 30-50.
|
|
LI M . Optimization and implementation of AES algorithms based on FPGA[D]. Harbin:Heilongjiang University, 2018: 30-50.
|
[18] |
PAMMU A A , CHONG K S , GWEE B H . Secured low power overhead compensator look-up-table (LUT) substitution box (S-Box) architecture[C]// IEEE International Conference on Networking. Springer, 2016: 3-6.
|
[19] |
KARTHIGAIKUMAR P , CHRISTY N A , MANGAI N M S . PSP CO2:an efficient hardware architecture for AES algorithm for high throughput[J]. Wireless Personal Communications, 2015,85(1): 305-323.
|
[20] |
汪鹏君, 郝李鹏, 张跃军 . 防御零值功耗攻击的AES SubByte模块设计及其VLSI实现[J]. 电子学报, 2012,40(11): 2183-2187.
|
|
WANG P J , HAO L P , ZHANG Y J . Design of AES SubByte module of anti-zero value power attack and its VLSI implementation[J]. ACTA Electronica sinica, 2012,40(11): 2183-2187.
|
[21] |
PROUFF E , RIVAIN M , VAN R . Statistical analysis of second order differential power analysis[J]. IEEE Transactions on Computer, 2009: 799-811.
|
[22] |
NASSAR M , GUILLEY S , DANGER J L . Formal analysis of the entropy/security trade-off in first-order masking countermeasures against side-channel attacks[C]// International Conference on Cryptology. Springer, 2011: 22-39.
|