[1] |
KOCHER P , JAFFE J , JUN B . Differential power analysis[C]// Advances in Cryptology - CRYPTO’99. Berlin:Springer, 1999: 388-397.
|
[2] |
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[C]// Cryptographic Hardware and Embedded Systems-CHES 2004. Berlin:Springer, 2004: 16-29.
|
[3] |
GIERLICHS B , BATINA L , TUYLS P ,et al. Mutual information analysis[C]// Cryptographic Hardware and Embedded Systems - CHES 2008. Berlin:Springer, 2008: 426-442.
|
[4] |
吴震, 王燚, 周冠豪 . 有学习的高阶DPA攻击[J]. 通信学报, 2018,39(9): 135-146.
|
|
WU Z , WANG Y , ZHOU G H . High order DPA with profiling[J]. Journal on Communications, 2018,39(9): 135-146.
|
[5] |
GOODWILL G , JUN B , JAFFE J ,et al. A testing methodology for side-channel resistance validation[C]// NIST Non-Invasive Attack Testing Workshop.[S.l.:s.n.], 2011: 115-136.
|
[6] |
STANDAERT F X . How (not) to use Welch’s t-test in side-channel security evaluations[C]// Smart Card Research and Advanced Applications. Berlin:Springer, 2019: 65-79.
|
[7] |
DAO B A , HOANG T T , LE A T ,et al. Correlation power analysis attack resisted cryptographic RISC-V SoC with random dynamic frequency scaling countermeasure[J]. IEEE Access, 2021,9: 151993-152014.
|
[8] |
STEINBAUER T , NAGPAL R , PRIMAS R ,et al. TVLA on selected NIST LWC finalists[EB]. 2022.
|
[9] |
LU C C , CUI Y J , KHALID A ,et al. A novel combined correlation power analysis (CPA) attack on schoolbook polynomial multiplication in lattice-based cryptosystems[C]// Proceedings of 2022 IEEE 35th International System-on-Chip Conference (SOCC). Piscataway:IEEE Press, 2022: 1-6.
|
[10] |
JEVTIC R , OTERO M G . Methodology for complete decorrelation of power supply EM side-channel signal and sensitive data[J]. IEEE Transactions on Circuits and Systems II:Express Briefs, 2022,69(4): 2256-2260.
|
[11] |
DING A A , ZHANG L W , DURVAUX F ,et al. Towards sound and optimal leakage detection procedure[C]// International Conference on Smart Card Research and Advanced Applications. Berlin:Springer, 2018: 105-122.
|
[12] |
王娅茹, 唐明 . 基于Bartlett和多分类F检验侧信道泄露评估[J]. 通信学报, 2021,42(12): 35-43.
|
|
WANG Y R , TANG M . Side channel leakage assessment with the Bartlett and multi-classes F-test[J]. Journal on Communications, 2021,42(12): 35-43.
|
[13] |
DING A A , CHEN C , EISENBARTH T . Simpler,faster,and more robust t-test based leakage detection[C]// International Workshop on Constructive Side-Channel Analysis and Secure Design. Berlin:Springer, 2016: 163-183.
|
[14] |
鹿福祥, 李伟键, 黄娴 . 基于配对 t 检验的侧信道泄露评估优化研究[J]. 小型微型计算机系统, 2019,40(12): 2585-2590.
|
|
LU F X , LI W J , HUANG X . Research on optimization of side channel leakage assessment based on paired t test[J]. Journal of Chinese Computer Systems, 2019,40(12): 2585-2590.
|
[15] |
ZHANG L W . Statistics in side channel analysis-modeling,metric,leakage detection testing[D]. Boston:Northeastern University, 2017.
|
[16] |
MORADI A , RICHTER B , SCHNEIDER T ,et al. Leakage detection with the x2-test[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(1): 209-237.
|
[17] |
BACHE F , PLUMP C , GüNEYSU T . Confident leakage assessment-a side-channel evaluation framework based on confidence intervals[C]// Proceedings of 2018 Design,Automation & Test in Europe Conference & Exhibition (DATE). Piscataway:IEEE Press, 2018: 1117-1122.
|
[18] |
MOOS T , WEGENER F , MORADI A . DL-LA:deep learning leakage assessment[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2021:doi.org/10.46586/tches.v2021.i3.552-598.
|
[19] |
WANG Y , TANG M , WANG P ,et al. The Levene test based-leakage assessment[J]. Integration, 2022,87: 182-193.
|
[20] |
MANGARD S , OSWALD E , POPP T . Power analysis attacks:revealing the secrets of smart cards[M]. Berlin: Springer, 2007.
|
[21] |
BHASIN S , BRUNEAU N , DANGER J L ,et al. Analysis and Improvements of the DPA Contest v4 Implementation[C]// International Conference on Security,Privacy,and Applied Cryptography Engineering. Berlin:Springer, 2014: 201-218.
|
[22] |
PROUFF E , RIVAIN M , BEVAN R . Statistical analysis of second order differential power analysis[J]. IEEE Transactions on Computers, 2009,58(6): 799-811.
|