[1] |
KOCHER P , JAFFE J , JUN B . Differential power analysis[C]// Advances in Cryptology — CRYPTO’ 99. Berlin:Springer, 1999: 388-397.
|
[2] |
MATHER L , OSWALD E , BANDENBURG J ,et al. Does my device leak information? an a priori statistical power analysis of leakage detection tests[C]// Advances in Cryptology — ASIACRYPT 2013. Berlin:Springer, 2013: 486-505.
|
[3] |
GIERLICHS B , BATINA L , TUYLS P ,et al. Mutual information analysis[C]// Cryptographic Hardware and Embedded Systems —CHES 2008. Berlin:Springer, 2008: 426-442.
|
[4] |
CHARI S , RAO J R , ROHATGI P . Template attacks[C]// Cryptographic Hardware and Embedded Systems — CHES 2002. Berlin:Springer, 2003: 13-28.
|
[5] |
SCHRAMM K , WOLLINGER T , PAAR C . A new class of collision attacks and its application to DES[C]// Fast Software Encryption. Berlin:Springer, 2003: 206-222.
|
[6] |
GOODWILL G , JUN B , JAFFE J ,et al. A testing methodology for side-channel resistance validation[C]// NIST non-invasive attack testing workshop.[S.l.:s.n.], 2011,7: 115-136.
|
[7] |
BECKER G , COOPER J , DEMULDER E ,et al. Test Vector Leakage Assessment (TVLA) methodology in practice[C]// International Cryptographic Module Conference.[S.l.:s.n.], 2013:20.
|
[8] |
WELCH B L . The generalization of ‘student’s’ problem when several different population variances are involved[J]. Biometrika, 1947,34(1/2): 28.
|
[9] |
AZOUAOUI M , BELLIZIA D , BUHAN I ,et al. A systematic appraisal of side channel evaluation strategies[C]// Security Standardisation Research. Berlin:Springer, 2020: 46-66.
|
[10] |
YU H , HE Z H , WU L J ,et al. Power leakage detection for a masked SM3-MAC hardware implementation[C]// Proceedings of 2019 IEEE 13th International Conference on Anti-counterfeiting,Security,and Identification (ASID). Piscataway:IEEE Press, 2019: 224-228.
|
[11] |
GUILLEY S , KARRAY K , PERIANIN T ,et al. Side-channel evaluation methodology on software[J]. Cryptography, 2020,4(4): 27.
|
[12] |
DING A A , CHEN C , EISENBARTH T . Simpler,faster,and more robust T-test based leakage detection[C]// Constructive Side-Channel Analysis and Secure Design. Berlin:Springer, 2016: 163-183.
|
[13] |
YANG W , JIA A N . Side-channel leakage detection with one-way analysis of variance[J]. Security and Communication Networks, 2021,2021: 1-13.
|
[14] |
WHITNALL C , OSWALD E . A cautionary note regarding the usage of leakage detection tests in security evaluation[R]. 2019.
|
[15] |
MERINO D P S , STANDAERT F X . Getting the most out of leakage detection[C]// Constructive Side-Channel Analysis and Secure Design. Berlin:Springer, 2017: 264-281.
|
[16] |
WHITNALL C , OSWALD E . A critical analysis of ISO 17825 (‘testing methods for the mitigation of non-invasive attack classes against cryptographic modules’)[C]// Lecture Notes in Computer Science. Berlin:Springer, 2019: 256-284.
|
[17] |
STANDAERT F X , . How (not) to use Welch’s T-test in side-channel security evaluations[C]// Smart Card Research and Advanced Applications. Berlin:Springer, 2019: 65-79.
|
[18] |
DING A A , ZHANG L W , DURVAUX F ,et al. Towards sound and optimal leakage detection procedure[C]// Smart Card Research and Advanced Applications. Berlin:Springer, 2018: 105-122.
|
[19] |
SCHNEIDER T , MORADI A . Leakage assessment methodology[J]. Journal of Cryptographic Engineering, 2016,6(2): 85-99.
|
[20] |
DURVAUX F , STANDAERT F X . From improved leakage detection to the detection of points of interests in leakage traces[C]// Advances in Cryptology — EUROCRYPT 2016. Berlin:Springer, 2016: 240-262.
|
[21] |
CHEN H , XI W , FAN L M ,et al. Side Channel Analysis and Evaluation on Cryptographic Products[J]. Journal of Electronics and Information Technology, 2020,42(8): 1836-1845.
|
[22] |
LEI W , WANG L H , SHAN W J ,et al. A frequency-based leakage assessment methodology for side-channel evaluations[C]// Proceedings of 2017 13th International Conference on Computational Intelligence and Security (CIS). Piscataway:IEEE Press, 2017: 590-593.
|
[23] |
BILGIN B , GIERLICHS B , NIKOVA S ,et al. Higher-order threshold implementations[C]// Lecture Notes in Computer Science. Berlin:Springer, 2014: 326-343.
|
[24] |
DE CNUDDE T , BILGIN B , REPARAZ O ,et al. Higher-order threshold implementation of the AES S-box[C]// Smart Card Research and Advanced Applications. Berlin:Springer, 2016: 259-272.
|
[25] |
PROUFF E , RIVAIN M , BEVAN R . Statistical analysis of second order differential power analysis[J]. IEEE Transactions on Computers, 2009,58(6): 799-811.
|
[26] |
BHASIN S , BRUNEAU N , DANGER J L ,et al. Analysis and improvements of the DPA contest v4 implementation[C]// Security,Privacy,and Applied Cryptography Engineering. Cham:Springer International Publishing, 2014: 201-218.
|