[1] |
KOCHER P C . Timing attacks on implementations of diffie-hellman,RSA,DSS,and other systems[A]. CRYPTO 1996[C]. Berlin: Springer, 1996. 104-113.
|
[2] |
KOCHER P C , JAFFE J , JUN B . Differential power analysis[A]. CRYPTO 1999[C]. Berlin: Springer, 1999. 388-397.
|
[3] |
QUISQUATER J , SAMYDE D . Electromagnetic analysis (EMA):measures and countermeasures for smart cards[A]. E-Smart 2001[C]. Berlin: Springer, 2001. 200-210.
|
[4] |
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[A]. CHES 2004[C]. Berlin: Springer, 2004. 16-29.
|
[5] |
CHARI S , RAO J R , ROHATGI P . Template attacks[A]. CHES 2002[C]. Berlin: Springer, 2002. 13-28.
|
[6] |
RECHBERGER C , OSWALD E . Practical template attacks[A]. WISA 2004[C]. Berlin: Springer, 2004. 440-456.
|
[7] |
MEDWED M , OSWALD E . Template attacks on ECDSA[A]. WISA 2008[C]. Berlin: Springer, 2008. 14-27.
|
[18] |
OLSSON U . Maximum likelihood estimation of the polychoric correlation coefficient[J]. Psychometrika, 1979,44(4): 443-460.
|
[9] |
WADDLE J , WAGNER D . Towards efficient second-order power analysis[A]. CHES 2004[C]. Berlin: Springer, 2004. 1-15.
|
[10] |
GEBOTYS C H , HO S , TIU C C . EM analysis of rijndael and ECC on a wireless java-based PDA[A]. CHES 2005[C]. Berlin: Springer, 2005. 250-264.
|
[11] |
GIERLICHS B , LEMKE-RUST K , PAAR C . Templates vs stochastic methods[A]. CHES 2006[C]. Berlin: Springer, 2006. 15-29.
|
[12] |
ARCHAMBEAU C , PEETERS E , STANDAERT F X , et al. Template attacks in principal subspaces[A]. CHES 2006[C]. Berlin: Springer, 2006. 1-14.
|
[13] |
VIDAL R , MA Y , SASTR Y . Generalized principal component analysis (GPCA)[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 2005,(27): 1945-1959.
|
[14] |
ZEITOUNI K . A survey of spatial data mining methods databases and statistics point of views[A]. IRMA[C]. Alaska,USA, 2000. 487-491.
|
[15] |
BOGDANOV A , KNUDSEN L R , LEANDER G , et al. PRESENT:an ultra-lightweight block cipher[A]. CHES 2007[C]. Berlin: Springer, 2007. 450-466.
|
[16] |
HONG D , SUNG J , HONG S . HIGHT:a new block cipher suitable for low-resource device[A]. CHES 2006[C]. Berlin: Springer, 2006. 46-59.
|
[17] |
GUO J , PEYRIN T , POSCHMANN A , et al. The LED block cipher[A]. CHES 2011[C]. Berlin: Springer, 2011. 326-341.
|
[18] |
李玮, 谷大武, 赵辰 等. 物联网环境下LED轻量级密码算法的安全性分析[J]. 计算机学报, 2012,35(3):434-445. LI W , GU D W , ZHAO C , et al. Security analysis of the LED lightweight cipher in the internet of things[J]. Chinese Journal of Computers, 2012,35(3):434-445.
|
[19] |
JEONG K , CHANGHOON L . Differential fault analysis on block cipher LED-64[A]. DFIS 2012[C]. Berlin: Springer, 2012. 747-755.
|
[20] |
JOVANOVIC P , KREUZER M , POLIAN I . A fault attack on the LED block cipher[A]. Proceedings of COSADE 2012[C]. Berlin: Springer, 2012. 120-134.
|
[21] |
KREUZER M . Algebraic fault attacks webinar[EB/OL]. .
|
[22] |
ZHAO X J , GUO S Z , ZHANG F , et al. Improving and evaluating differential fault analysis on LED with algebraic techniques[A]. FDTC2013[C]. Santa Barbara,USA, 2013. 41-51.
|
[23] |
冀可可, 王韬, 郭世泽 . 基于汉明重的 LED 代数旁路攻击研究[J]. 通信学报, 2010,31(12):82-89. JIN K K , WANG T , GUO S Z . Research of Hamming weight-based algebraic side-channel attack on LED[J]. Journal on Communications, 2010,31(12):82-89.
|
[24] |
冀可可, 王韬, 赵新杰 等. 基于碰撞模型的 LED 代数旁路攻击[J]. 计算机应用研究, 2013,30(1):270-272. JIN K K , WANG T , ZHAO X J . Collision model-based algebraic sidechannel attack on LED[J]. Application Research of Computers, 2013,30(1):270-272.
|
[25] |
ZHANG L , ZHANG D . Finger-knuckle-print verification based on band-limited phase-only correlation[A]. Proceedings of the 13th International Conference on Computer Analysis of Images and Patterns[C]. Berlin: Springer, 2009. 141-148.
|