[1] |
KOCHER P C , . Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[C]// Annual International Cryptology Conference. 1996: 104-113.
|
[2] |
KOCHER P , JAFFE J , JUN B . Differential power analysis[C]// Annual International Cryptology Conference. 1999: 388-397.
|
[3] |
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2004: 16-29.
|
[4] |
CHARI S , RAO J R , ROHATGI P . Template attacks[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2002: 13-28.
|
[5] |
LERMAN L , MEDEIROS S F , VESHCHIKOV N ,et al. Semisupervised template attack[C]// International Workshop on Constructive Side-Channel Analysis and Secure Design. 2013: 184-199.
|
[6] |
SCHINDLER W , LEMKE K , PAAR C . A stochastic model for differential side channel cryptanalysis[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2005: 30-46.
|
[7] |
GIERLICHS B , LEMKE-RUST K , PAAR C . Templates vs.stochastic methods[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2006: 15-29.
|
[8] |
KARSMAKERS P , GIERLICHS B , PELCKMANS K ,et al. Side channel attacks on cryptographic devices as a classification problem[J]. Esat Kuleuven Be, 2009,7:36.
|
[9] |
LERMAN L , POUSSIER R , BONTEMPI G ,et al. machine learning revisited (and the curse of dimensionality in side-channel analysis)[C]// International Workshop on Constructive Side-Channel Analysis and Secure Design. 2015: 20-33.
|
[10] |
LERMAN L , BONTEMPI G , MARKOWITCH O . Side channel attack:an approach based on machine learning[J]. Center for Advanced Security Research Darmstadt, 2011: 29-41.
|
[11] |
BATINA L , GIERLICHS B , LEMKE-RUST K . Differential cluster analysis[M]// Cryptographic Hardware and Embedded Systems-CHES. 2009: 112-127.
|
[12] |
CHOU J W , CHU M H , TSAI Y L ,et al. An unsupervised learning model to perform side channel attack[C]// Pacific-Asia Conference on Knowledge Discovery and Data Mining. 2013: 414-425.
|
[13] |
HEYSZL J , IBING A , MANGARD S ,et al. Clustering algorithms for non-profiled single-Execution attacks on exponentiations[C]// International Conference on Smart Card Research and Advanced Applications. 2013: 79-93.
|
[14] |
LEMKE-RUST K , PAAR C . Gaussian mixture models for higher-order side channel analysis[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2007: 14-27.
|
[15] |
MANGARD S , OSWALD E , POPP T . Power analysis attacks:revealing the secrets of smart card[M]. New York:Springer. 2007.
|
[16] |
STANDAERT F X , MALKIN T G , YUNG M . A unified framework for the analysis of side-channel key recovery attacks[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2009: 443-461.
|