[1] |
KOCHER P , JAFFE J , JUN B . Differential power analysis[A]. Pro-ceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology[C]. 1999.388-397.
|
[2] |
P KOCHER C . Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[A]. Advances in Cryptology-CRYPTO' 96, Lecture Notes in Computer Science[C]. 1996.104-113.
|
[3] |
韩军, 曾晓洋, 汤庭鳌 . 基于时间随机化的密码芯片防攻击方法[J]. 计算机工程, 2007,33(2):6-8. HAN J , ZENG X Y , TANG T A . Modeling timing randomization in cryptographic chip against power analysis attack[J]. Computer Engi-neering, 2007,33(2):6-8.
|
[4] |
成为, 谷大武, 郭筝 等. 一种针对RSA-CRT的功耗分析攻击方法[J]. 通信技术, 2011,6(44):123-125. CHENG W , GU D W , GUO Z , et al. A power analysis attack against RSA-CRT[J]. Communications Technology, 2011,6(44):123-125.
|
[5] |
吴震, 陈运, 陈俊 等. 真实硬件环境下幂剩余功耗轨迹指数信息提取[J]. 通信学报, 2010,31(2):17-21. WU Z , CHEN Y , CHEN J , et al. Exponential information's extraction from power traces of modulo exponentiation implemented on FPGA[J]. Journal on Communications, 2010,31(2):17-21.
|
[6] |
ACICMEZ O , SEIFERT J P , KOC C K . Predicting Secret Keys Via Branch Prediction[R]. Topics in Cryptology-CT-RSA, 2007.
|
[7] |
ACIICMEZ O , KOC C K , SEIFERT J P . On the Power of Simple-Branch Prediction Analysis[R]. Cryptology ePrint Archive, 2006.
|
[8] |
李志强, 严迎建, 段二鹏 . 差分能量攻击所需样本数量研究[J]. 计算机工程, 2013,38(24):128-132. LI Z Q , YAN Y J , DUAN E P . Research on sample amounts needed by dif-ferential power attack[J]. Computer Engineering, 2013,38(24):128-132.
|
[9] |
KADLOOR S , KIYAVASH N , VENKITASUBRAMANIAM P . Miti-gating timing side channel in shared schedulers[J]. arXiv preprint arXiv:1302.6123, 2013.
|
[10] |
BAUER A , JAULMES E , PROUFF E , et al. Horizontal and vertical side-channel attacks against secure RSA implementations[A]. Topics in Cryptology-CT-RSA 2013 Springer Berlin Heidelberg[C]. 2013.1-17.
|
[11] |
PROUFF E , RIVAIN M . Masking against side-channel attacks: a formal security proof[A]. Advances in Cryptology-EUROCRYPT 2013 Springer Berlin Heidelberg[C]. 2013.142-159.
|
[12] |
杜之波, 陈运 . 防范边信道攻击的逆伪操作实现算法[J]. 计算机工程, 2010,36(3):131-133. DU Z B , CHEN Y . Implementation algorithm of pseudo modular in-version secure against side channel attack[J]. Computer Engineering, 2010,36(3):131-133.
|
[13] |
BRICKEL E F . A survey of hardware implementations of RSA[A]. Proceedings of the Advances in Cryptology(CRYP TO'89)[C]. Santa Barbara, USA, 1990.368-370.
|
[14] |
MARCELO E K , NAOFUMI T . A hardware algorithm for modular multiplication division based on the extended Euclidean algorithm[A]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences[C]. 2005.3610-3617.
|