[1] |
KOCHER P , JAFFE J , JUN B . Differential power analysis[A]. Crypto 1999[C]. Santa-Barbara,CA,USA, 1999. 398-412.
|
[2] |
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model[A]. Cryptographic Hardware Embedded SystemCHES 2004 Lec-ture Notes in Computer Science[C]. 2004. 16-29.
|
[3] |
CHARI S , RAO J , ROHATGI P . Template attacks.cryptographic hard-ware and embedded systems-ches[A]. The 4th International Workshop,Redwood Shores[C]. 2002.
|
[4] |
GIERLICHS B , BATINA L , TUYLS P , et al. Mutual information analysis[A]. CHES 2008[C]. Washington DC,USA, 2008.
|
[5] |
VEYRAT-CHARVILLON N , STANDAERT F X . Mutual information analysis:how,when and why[A]. Cryptographic Hardware and Embedded Sys-tems-CHES 2009[C]. Lecture Notes in Computer Science.Springer, 2009.
|
[6] |
GIERLICHS B , BATINA L , TUYLS P . Mutual information analysis a universal differential side-channel attack[J]. Journal of Cryptology, 2010,24(2): 269-291.
|
[7] |
MATEOS E , GEBOTYS C H . A new correlation frequency analysis of the side channel[A]. Proceedings of the 5th Workshop on Embedded Systems Se-curity[C]. ACM, 2010.
|
[8] |
LINGE Y , DUMAS C . LAMBERT-LACROIX S . Maximal Information Coefficient Analysis[R]. Cryptology ePrint Archive:Report 2014/012, 2014.
|
[9] |
沈薇 . SM4 算法的能量攻击及其防御研究[D]. 西安:西安电子科技大学, 2009. SHEN W . Research of Power Attack and Defense on SM4 Algorithm[D]. Xi’an:Xidian University, 2009.
|
[10] |
BATINA L , HOGENBOOM J , et al. Getting more from PCA:first results of using principal component analysis for extensive power analysis[A]. Topics in Cryptology–CT-RSA 2012[C]. Springer Berlin Hei-delberg, 2012. 383-397.
|