[1] |
KOCHER P , JAFFE J AND JUN B . Differential power analysis[J]. Lecture Notes in Computer Science, 1999: 388-397.
|
[2] |
AO J R , ROHATGI P . Template attacks[J]. International Workshop on Cryptographic Hardware and Embedded Systems, 2002: 13-28.
|
[3] |
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[C]// Cryptographic Hardware and Embedded Systems.[S.l.:s.n.], 2004.
|
[4] |
CHRISTIAN R , ELISABETH O . Practical template attacks[C]// Proceedings of the 5th international conference on Information Security Applications (WISA'04).[S.l.:s.n.], 2004: 440-456.
|
[5] |
ARCHAMBEAU C , PEETERS E , STANDAERT F X ,et al. Template attacks in principal subspaces[C]// Cryptographic Hardware and Embedded Systems.[S.l.:s.n.], 2006.
|
[6] |
GIERLICHS B , LEMKE-RUST K , PAAR C ,et al. Stochastic methods[C]// Cryptographic hardware and embedded systems.[S.l.:s.n.], 2006.
|
[7] |
STANDAERTF X , ARCHAMBEAU C . Using subspace-based template attacks to compare and combine power and electromagnetic information leakages[C]// Cryptographic Hardware and Embedded Systems.[S.l.:s.n.], 2008.
|
[8] |
HOSPODAR G , GIERLICHS B , DE MULDER E ,et al. Machine learning in side-channel analysis:a first study[J]. Journal of Cryptographic Engineering, 2011,1(4): 293-302.
|
[9] |
LERMAN L , MEDEIROS S F , VESHCHIKOV N ,et al. Semi-supervised template attack[J]. IACR Cryptology EPrint Archive,2012, 2012:82.
|
[10] |
KIM J , PICEK S , HEUSER A ,et al. [J]. Make some noise.unleashing the power of convolutional neural networks for profiled side-channel analysis, 2019: 148-179.
|
[11] |
马向亮, 王宏, 李冰 ,等. 基于能量分析技术的芯片后门指令分析方法[J]. 电子学报, 2019,47(3): 686-691.
|
|
MA X L , WANG H , LI B ,et al. A power analysis method against backdoor instruction in chips[J]. Acta Electronica Sinica, 2019,47(3): 686-691.
|
[12] |
BENADJILA R , PROUFF E , STRULLU R ,et al. Deep learning for side-channel analysis and introduction to ASCAD database[J]. Journal of Cryptographic Engineering, 2020,10(2): 163-188.
|
[13] |
BENADJILA R , PROUFF E,STRULLUR ,et al. Deep learning for side-channel analysis and introduction to ASCAD database[J]. Journal of Cryptographic Engineering, 2020,10(2): 163-188.
|
[14] |
CAI X M , LI R F , KUANG S J ,et al. An energy trace compression method for differential power analysis attack[J]. IEEE Access, 2020(8): 89084-89092.
|
[15] |
DUAN X Y , CHEN D , FAN X H ,et al. Research and implementation on power analysis attacks for unbalanced data[J]. Security and Communication Networks, 2020:5695943.
|