[1] |
KOCHER P C . Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[A]. CRYPTO 1996[C]. Berlin: Springer, 1996. 104-113.
|
[2] |
KOCHER P C , JAFFE J , JUN B . Differential power analysis[A]. CRYPTO 1999[C]. Berlin: Springer, 1999. 388-397.
|
[3] |
QUISQUATER J J , SAMYDED D . Electromagnetic analysis (EMA):measures and countermeasures for smart cards[A]. e-Smart 2001[C]. Berlin: Springer, 2001. 200-210.
|
[4] |
BATINA L , GIERLICHS B , PROUFF E . Mutual information analysis: a comprehensive study[J]. Journal of Cryptology, 2011(24): 269-291.
|
[5] |
WHITNALL C , OSWALD E , MATHER L . An exploration of the Kolmogorov-Smirnov test as competitor to mutual information analysis[EB/OL].
|
[6] |
BOGDANOV A . Improved side-channel collision attacks on AES[A]. AC 2007, LNCS 4876[C]. Berlin:Springer, 2007. 84-95.
|
[7] |
DINUR I , SHAMIR A . Side channel cube attacks on block ciphers[EB/OL].
|
[8] |
RENAULD M , STANDAERT F -X . Algebraic side-channel attacks[A]. NSCRYPT 2009[C]. Berlin:Springer, 2009. 393-410.
|
[9] |
RENAULD M , STANDAERT F X , VEYRAT C N . Algebraic side-channel attacks on the AES:Why time also matters in DPA[A]. CHES 2009[C]. Berlin:Springer, 2009. 97-111.
|
[10] |
OREN Y , KIRSCHBAUM M , PPOPP T . Algebraic side-channel analysis in the presence of errors[A]. CHES 2010[C]. Berlin:Springer, 2010. 428-442.
|
[11] |
ZHAO X J , ZHANG F , GUO S Z . MDASCA:an enhanced algebraic side-channel attack for error tolerance and new leakage model exploitation[A]. Proceedings of COSADE 2012[C]. 2012.
|
[12] |
GUO J , PEYRIN T , POSCHMANN A . The LED bock cipher[A]. Berlin:Springer, 2011. 326-341.
|
[13] |
NICOLAS T. C , GREGORY V. B . Algebraic cryptanalysis of the data encryption standard[A]. 11-th IMA Conference[C]. Cirencester, UK, 2007. 152-169
|
[14] |
FU Z , MARHAJAN Y , MALIK S . zChaff SAT solver[EB/OL].
|
[15] |
E′EN N , S?RENSSON N . An open-source SAT solver package[EB/OL].
|
[16] |
SOOS M , NOHL K , CASTELLUCCIA C . Extrending SAT solvers to cryptographic problems[A]. SAT 2009[C]. Berlin:Springer. 2009. 244-257.
|
[17] |
TOBIAS A . Constraint Integer Programming[D]. TU Berlin, 2007.
|
[18] |
BERTHOLD T , HEINZ S , PFETSCH M E . SCIP- solving constraint integer programs[A]. SAT 2009[C]. Berlin:Springer, 2009.
|
[19] |
BERTHOLD T , HEINZ S , PFETSCH M E . Nonlinear pseudo-boolean optimization:Relaxation or propagation? [A]. Berlin:Springer, 2009. 441-446.
|
[20] |
CARLA P. G , ASHISH S , Handbook of Satisfiability[M]. IOS Press, 2009. 633-654.
|
[21] |
KNUDSEN L R , MIOLANE C V . Counting equations in algebraic attacks on block ciphers[J]. International Journal of Information Security, 2010,9(2):127-135.
|
[22] |
CHARI S , RAO J R , ROHATAJ P . Template attacks[A]. CHES 2002[C]. Berlin:Springer, 2002. 13-28.
|
[23] |
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[A]. CHES 2004[C]. Berlin:Springer, 2004. 16-29.
|