[1] |
CHEHAB M , MOURAD A . LP-SBA-XACML:lightweight semantics based scheme enabling intelligent behavior-aware privacy for IoT[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(1): 161-175.
|
[2] |
ALRAWI O , LEVER C , ANTONAKAKIS M ,et al. SoK:security evaluation of home-based IoT deployments[C]// Proceedings of 2019 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2019: 1362-1380.
|
[3] |
BANIK S , ISOBE T , LIU F K ,et al. Orthros:a low-latency PRF[J]. IACR Transactions on Symmetric Cryptology, 2021(1): 37-77.
|
[4] |
BEIERLE C , LEANDER G , MORADI A ,et al. CRAFT:lightweight tweakable block cipher with efficient protection against DFA attacks[J]. IACR Transactions on Symmetric Cryptology, 2019(1): 5-45.
|
[5] |
NAITO Y , MATSUI M , SUGAWARA T ,et al. SAEB:a lightweight blockcipher-based AEAD mode of operation[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(2): 192-217.
|
[6] |
NAITO Y , SASAKI Y , SUGAWARA T . Lightweight authenticated encryption mode suitable for threshold implementation[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2020: 705-735.
|
[7] |
CANTEAUT A , DUVAL S , LEURENT G ,et al. Saturnin:a suite of lightweight symmetric algorithms for post-quantum security[J]. IACR Transactions on Symmetric Cryptology, 2020(1): 160-207.
|
[8] |
BONEH D , DEMILLO R A , LIPTON R J . On the importance of checking cryptographic protocols for faults[C]// Advances in Cryptology - EUROCRYPT ’97. Berlin:Springer, 1997: 37-51.
|
[9] |
FUHR T , JAULMES E , LOMNé V ,et al. Fault attacks on AES with faulty ciphertexts only[C]// Proceedings of 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography. Piscataway:IEEE Press, 2013: 108-118.
|
[10] |
CLAVIER C , . Secret external encodings do not prevent transient fault analysis[C]// International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2007: 181-194.
|
[11] |
BIHAM E , SHAMIR A . Differential fault analysis of secret key cryptosystems[C]// Advances in Cryptology - CRYPTO’97. Berlin:Springer, 1997: 513-525.
|
[12] |
COURTOIS N , WARE D A , JACKSON K . Fault-algebraic attacks on inner rounds of DES[C]// Strategies Telecom and Multimedia. Montreuil:Computer Science, 2010: 22-24.
|
[13] |
DERBEZ P , FOUQUE P A , LERESTEUX D . Meet-in-the-middle and impossible differential fault analysis on AES[C]// International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2011: 274-291.
|
[14] |
ZHANG F , LOU X X , ZHAO X J ,et al. Persistent fault analysis on block ciphers[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3): 150-172.
|
[15] |
JANA A , PAUL G . Differential fault attack on PHOTON-beetle[C]// Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security. New York:ACM Press, 2022: 25-34.
|
[16] |
ZHANG F , FENG T X , LI Z Q ,et al. Free fault leakages for deep exploitation:algebraic persistent fault analysis on lightweight block ciphers[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(2): 289-311.
|
[17] |
王永娟, 樊昊鹏, 代政一 ,等. 侧信道攻击与防御技术研究进展[J]. 计算机学报, 2023,46(1): 202-228.
|
|
WANG Y J , FAN H P , DAI Z Y ,et al. Research progress of side channel attack and defense technology[J]. Chinese Journal of Computers, 2023,46(1): 202-228.
|
[18] |
DOBRAUNIG C , EICHLSEDER M , KORAK T ,et al. Statistical fault attacks on nonce-based authenticated encryption schemes[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2016: 369-395.
|
[19] |
李玮, 汪梦林, 谷大武 ,等. 轻量级密码算法TWINE的唯密文故障分析[J]. 通信学报, 2021,42(3): 135-149.
|
|
LI W , WANG M L , GU D W ,et al. Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm[J]. Journal on Communications, 2021,42(3): 135-149.
|
[20] |
SUGAWARA T , SHOJI N , SAKIYAMA K ,et al. Exploiting bitflip detector for non-invasive probing and its application to ineffective fault analysis[C]// Proceedings of 2017 Workshop on Fault Diagnosis and Tolerance in Cryptograph. Piscataway:IEEE Press, 2017: 49-56.
|
[21] |
CLAVIER C , WURCKER A . Reverse engineering of a secret AES-like cipher by ineffective fault analysis[C]// Proceedings of 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography. Piscataway:IEEE Press, 2013: 119-128.
|
[22] |
DOBRAUNIG C , EICHLSEDER M , KORAK T ,et al. SIFA:exploiting ineffective fault inductions on symmetric cryptography[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3): 547-572.
|
[23] |
BAGHERI N , SADEGHI S , RAVI P ,et al. SIPFA:statistical ineffective persistent faults analysis on Feistel ciphers[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(3): 367-390.
|
[24] |
VAFAEI N , ZAREI S , BAGHERI N ,et al. Statistical effective fault attacks:the other side of the coin[J]. IEEE Transactions on Information Forensics and Security, 2022,17: 1855-1867.
|
[25] |
DOBRAUNIG C , EICHLSEDER M , GROSS H ,et al. Statistical ineffective fault attacks on masked AES with fault countermeasures[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2018: 315-342.
|
[26] |
GRUBER M , PROBST M , TEMPELMEIER M . Statistical ineffective fault analysis of GIMLI[C]// Proceedings of 2020 IEEE International Symposium on Hardware Oriented Security and Trust. Piscataway:IEEE Press, 2020: 252-261.
|
[27] |
FISHER R A . On the mathematical foundations of theoretical statistics[J]. Philosophical Transactions of the Royal Society of London, 1922,222(594): 309-368.
|
[28] |
REED I . A class of multiple-error-correcting codes and the decoding scheme[J]. Transactions of the IRE Professional Group on Information Theory, 1954,4(4): 38-49.
|
[29] |
CHA S H . Comprehensive survey on distance/similarity measures between probability density functions[J]. International Journal of Mathematical Models & Methods in Applied Sciences, 2007,1(4): 300-307.
|