[1] |
ALIOTO M , SHAHGHASEMI M . The Internet of things on its edge:trends toward its tipping point[J]. IEEE Consumer Electronics Magazines, 2018,7(1): 77-87.
|
[2] |
BAKER T , UGLJANIN E , FACI N ,et al. Everything as a resource:foundations and illustration through Internet-of-things[J]. Computers in Industry, 2018,94(1): 62-74.
|
[3] |
KWON D , KIM J , PARK S ,et al. New block cipher:ARIA[C]// International Conference of Information Security and Cryptology. 2003: 432-445.
|
[4] |
BIRYUKOV A , CANNIERE D C , LANO J ,et al. Security and performance analysis of ARIA[J]. Internal Report,KU Leuven ESAT/SCD-COSIC, 2004: 1-55.
|
[5] |
LI P , SUN B , LI C . Integral cryptanalysis of ARIA[C]// International Conference of Information Security and Cryptology. 2009: 1-14.
|
[6] |
LIU Z , GU D , LIU Y ,et al. Linear cryptanalysis of ARIA block cipher[C]// International Conference of Information and Communications Security, 2011: 242-254.
|
[7] |
LI Y , WU W , ZHANG L . Integral attacks on reduced-round ARIA block cipher[C]// International Conference of Information Security,Practice and Experience. 2010: 19-29.
|
[8] |
WU W , ZHANG W , FENG D . Impossible differential cryptanalysis of reduced–round ARIA and Camellia[J]. Journal of Computer Science and Technology, 2007,22(3): 449-456.
|
[9] |
HESS E , JANSSEN N , MEYER B ,et al. Information leakage attacks against smart card implementations of cryptographic algorithms and countermeasures–a survey[C]// International Conference on Research in Smart Cards. 2000: 55-64.
|
[10] |
JOYE M , QUISQUATER J J , YEN S M ,et al. Observability analysis-detecting when improved cryptosystems fail[C]// The Cryptographer's Track at the RSA Conference on Topics in Cryptology. 2002: 17-29.
|
[11] |
KELSEY J , SCHNEIER B , WAGNER D ,et al. Side channel cryptanalysis of product ciphers[C]// European Symposium on Research in Computer Security. 1998: 97-110.
|
[12] |
LIN I C , CHANG C C . Security enhancement for digital signature schemes with fault tolerance in RSA[J]. Information Sciences, 2007,177(19): 4031-4039.
|
[13] |
BIHAM E , SHAMIR A . Differential fault analysis of secret key cryptosystems[C]// Annual International Cryptology Conference. 1997: 513-525.
|
[14] |
BONEH D , DEMILLO R A , LIPTON R J . On the importance of checking cryptographic protocols for faults[C]// International Conference on Theory and Application of Cryptographic Techniques. 1997: 37-51.
|
[15] |
BONEH D , DEMILLO R A , LIPTON R J . On the importance of eliminating errors in cryptographic computations[J]. Journal of Cryptology, 2001,14(2): 101-119.
|
[16] |
BIEHL I , MEYER B , MULLER V . Differential fault attacks on elliptic curve cryptosystems[C]// International Cryptology Conference on Advances in Cryptology. 2000: 131-146.
|
[17] |
FISCHER W , REUTER C A . Differential fault analysis on Gr?stl[C]// Workshop on Fault Diagnosis and Tolerance in Cryptography. 2012: 44-54.
|
[18] |
HEMME L , HOFFMANN L . Differential fault analysis on the SHA1 compression function[C]// Workshop on Fault Diagnosis and Tolerance in Cryptography. 2011: 54-62.
|
[19] |
HOCH J J , SHAMIR A . Fault analysis of stream ciphers[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2004: 240-253.
|
[20] |
LI W , GU D , LI J . Differential fault analysis on the ARIA algorithm[J]. Information Sciences, 2008,178(19): 3727-3737.
|
[21] |
PARK J H , HA J C . Improved differential fault analysis on block cipher ARIA[C]// International Workshop on Information Security Applications. 2012: 82-95.
|
[22] |
KIM H C . Differential fault analysis of ARIA in multi-byte fault models[J]. Journal of Systems and Software, 2012,85(9): 2096-2103.
|
[23] |
PHAN R C W , YEN M . Amplifying side-channel attacks with techniques from block cipher cryptanalysis[J]. International Conference on Smart Card Research and Advanced Applications, 2006: 135-150.
|
[24] |
DAEMEN J , KNUDSEN L R , RIJMEN V . The block cipher square[C]// International Workshop on Fast Software Encryption. 1997: 149-165.
|
[25] |
LIDL R , NIEDERREITER H . Finite fields[M]. Cambridge: Cambridge University PressPress, 1997.
|