[1] |
KOBLIZ N . Elliptic curve cryptosystems[J]. Mathematics of Com-puting American Mathematical Society, 1987,48 (48):203-309.
|
[2] |
KOCHER P C. . Timing attacks on implementations of diffie-hellman,RSA,DSS and other systems[C]// nternational Cryptology Confer-ence on Advances in Cryptology.c 1996:104-113.
|
[3] |
KOCHER P , JAFFE J , JUN B . Differential power analysis[C]// The 19th Annual International Cryptology Conference on Advances in Cryptology.c 1999:388-397.
|
[4] |
QUISQUATER J J , SAMYDE D . Electromagnetic analysis (EMA):measuresand counter measures for smart cards[C]// The Interna-tional Conference on Research in Smart Cards:Smart Card Pro-gramming and Security.c 2001:200-210.
|
[5] |
PADE D . Theoretical use of cache memory as a cryptanalytic side-channel[R]. Department of Computer Science,University of Bristol, 2002.
|
[6] |
赵新杰, 郭世泽, 王韬 . 针对AES和CLEFIA的改进Cache踪迹驱动攻击[J]. 通信学报 2011,32(8):101-110.
|
|
ZHAO X J , GUO S Z , WANG T , et al . Improved cache trace driven attack on AES and CLEFIA[J]. Journal on Communications, 2011,32(8):101-110.
|
[7] |
BONEH D , DEMILLO R A , LIPON R J . On the importance of checking cryptographic protocols for faults[J]. Journal of Cryptol-ogy, 2001,14(2): 101-119.
|
[8] |
张金中, 寇应展, 王韬 . 针对滑动窗口算法的椭圆曲线密码故障分析[J]. 通信学报 2012,33(1):71-78.
|
|
ZHANG J Z , KOU Y Z , WANG T , et al . Elliptic curve cryptosystem fault analysis on the sliding window algorithm[J]. Journal on Communications, 2012,33(1):71-78.
|
[9] |
YANF B , WU K J , KARRI R . Scan-based side-channel attack on dedicated hardware implementations of data encryption stan-dard[C]// IEEE International Test Conference (ITC).c 2004:339-344.
|
[10] |
SCHINDLER W . A timing attack RSA with the Chinese remainder theorem[C]// Lecture Notes in Computer Science (LNCS).c 2000:109-124.
|
[11] |
BRUMLEY D , BONEH D . Remote timing attacks are practical[J]. Computer Networks, 2005,48(5):701-716.
|
[12] |
CANVEL B , HILTGEN A , VAUDENAY S . Password interception in a SSL/TLS channel[J]. Information Technology Journal, 2003,2729(3): 583-599.
|
[13] |
CATHALO J , KOEUNE F , QUISQUATER J J . A new type of timing attack:application to GPS[M]// Berlin Heidelberg: Springer, 2003:291-303.
|
[14] |
SAKURAI K , TAKAGI T . A reject timing attack on an IND-CCA2 public-key cryptosystem[C]// The 5th International Conference on Information Security and Cryptology.c 2002:359-373.
|
[15] |
LEVINE B N , REITER M K , WANG C , et al . Timing attacks in low-latency mix systems[M]// Berlin Heidelberg: Springer, 2004:251-265.
|
[5] |
TOTH R , FAIGL Z , SZALAY M . An advanced timing attack scheme on RSA[C]// The 13th International IEEE Telecommunica-tions Network Strategy and Planning Symposium.c 2008:1-24.
|
[17] |
KARLOF C , WAGNER D . Hidden Markov model cryptanaly-sis[C]// Lecture Notes in Computer Science (LNCS).c 2004:17-34.
|
[18] |
GREEN P J , NOAD R , SMART N P . Further hidden Markov model crytannalysis[M]// Berlin Heidelberg: Springer, 2005:61-74.
|
[19] |
BRUMLEY B B , HAKALA R M . Cache-timing template at-tacks[C]// Lecture Notes in Computer Science (LNCS).c 2009:667-684.
|
[20] |
RABINER L R . A tutorial on hidden Markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1989,77 (2):257-289.
|
[21] |
GROVER L . A fast quantum mechanical algorithm for database search[C]// ACM Symposium on Theory of Computing.c 2008:212-219.
|