[1] |
PAUL K . Timing attacks on implementations of diffie-hellman,RSA,DSS,and other systems[C]// CRYPTO 1996, Berlin c1996: 104-113.
|
[2] |
PAUL K , JOSHUA J , BENJAMIN J . Differential power analysis[C]// The 19th Annual International Cryptology Conference on Advances in Cryptology. c1999: 388-397.
|
[3] |
ERIC B , CHRISTOPHE C , FRANCIS O . Correlation power analysis with a leakage model[C]// Cryptographic Hardware and Embedded Systems–CHES 2004, c2004: 16-29.
|
[4] |
SURESH C , JOSYULA R R , PANKAJ R . Template attacks[C]// Cryptographic Hardware and Embedded Systems-CHES 2002. c2003: 13-28.
|
[5] |
MIHIR B , RAN C , HUGO K . Keying hash functions for message authentication[C]// Neal Koblitz,CRYPTO. c1996: 1-15.
|
[6] |
China's Office of security commercial code administration:sepecifi-cation of SM3 cryptographic hash function[EB/OL]. . 2010.
|
[7] |
KATSUYUKI O . Side channel attacks against HMACs based on lock-cipher based hash functions[C]// Information Security and Privacy(ACISP 2006). c2006: 432-443.
|
[8] |
ROBERT M , MICHAEL T , COLIN C M , et al. Differential power analysis of HMAC based on SHA-2,and countermeasures[J]. Infor-mation Security Applications, 2007,4867: 317-332.
|
[9] |
GUO L M , LI Q , WANG L H , et al. A differential power analysis attack on dynamic password token based on SM3 algorithm[C]// First International Conference on Information Science and El nic Technology(ISET 2015). c2015: 107-110.
|
[10] |
GUO L M , LI Q , WANG L H , et al. A first-order differential power analysis attack on HMAC-SM3[C]// First International Conference on Information Science and Electronic Technology(ISET 2015). c2015: 94-97.
|
[11] |
吴震, 陈运, 陈俊 , 等. 真实硬件环境下幂剩余功耗轨迹指数信息提取[J]. 通信学报, 2010,31(2): 17-21. WU Z , CHEN Y , CHEN J , et al. Exponential information's extraction from power traces of modulo exponentiation implemented on FPGA[J]. Journal on Communications, 2010,31(2): 17-21.
|
[12] |
王敏, 杜之波, 吴震 , 等. 针对SMS4轮输出的选择明文能量分析攻击[J]. 通信学报, 2015,36(1): 2015016. WANG M , DU Z B , WU Z , et al. Chosen-plaintext power analysis at-tack against SMS4 with the round-output as the intermediate data[J]. Journal on Communications, 2015,36(1): 2015016.
|