[1] |
KOCHER P C . Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[C]//Advances in Cryptology. 1996:104-113.
|
[2] |
KOCHER P C , JAFFE J , JUN B . Differential power analysis[M]. Berlin:Springer, 1999:388-397.
|
[3] |
QUISQUATER J J . A new tool for non-intrusive analysis of smart cards based on electromagnetic emissions,the SEMA and DEMA methods[J]. Eurocrypt 2000 Rump Session, 2000.
|
[4] |
BONEH D , DEMILLO R A , LIPTON R J . On the importance of checking cryptographic protocols for faults[C]//International Confer-ence on Theory & Application of Cryptographic Techniques. 1997:37-51.
|
[5] |
STANDAERT F X , MALKIN T G , LIPTON R J . On the importance of checking cryptographic protocols for faults[C]//International Confer-ence on Theory & Application of Cryptographic Techniques. 1997:37-51.
|
[6] |
ABID T , ALI M . Differential power analysis countermeasure for improved DES with dynamic key management[J]. Bahria Univer-sity Journal of Information & Communication Technology, 2015,8(2):15-21.
|
[7] |
MANGARD S . A simple power-analysis (SPA) attack on implementa-tions of the AES key expansion[C]//International Conference on In-formation Security and Cryptology. 2002:343-358.
|
[8] |
ORS S B , GURKAYNAK F , OSWALD E , et al. Power-analysis attack on an ASIC AES implementation[C]//International Confer-ence on Information Technology:Coding and Computing. 2004:546-552.
|
[9] |
OSWALD E , MANGARD S , HERBST C , et al. Practical sec-ond-order DPA attacks for masked smart card implementations of block ciphers[C]//Cryptographers' Track at The RSA Conference. 2006:192-207.
|
[10] |
向春玲, 吴震, 饶金涛 , 等. 针对一种 AES 掩码算法的频域相关性能量分析攻击[J].计算机工程[J]. 计算机工程, 2016,42(10):146-150. XIANG C L , WU Z , RAO J T , et al. Correlation power analysis attack in frequency domain for an AES mask algorithm[J]. Computer Engi-neering, 2016,42(10):146-150.
|
[11] |
OSWALD E , MANGARD S , PRAMSTALLER N , et al. A side-channel analysis resistant description of the AES S-box[C]//International Workshop on Fast Software Encryption. 2005:413-423.
|
[12] |
BONNECAZE A , LIARDET P , VENELLI A . AES side-channel coun-termeasure using random tower field constructions[J]. Designs,codes and Cryptography, 2013,69(3):331-349.
|
[13] |
OSVIK D A , SHAMIR A , TROMER E . Cache attacks and counter-measures:the case of AES[C]//Cryptographers' Track at the RSA Conference. 2006:1-20.
|
[14] |
MANGARD S , SCHRAMM K . Pinpointing the side-channel leak-age of masked AES hardware implementations[C]//International Workshop on Cryptographic Hardware and Embedded Systems. 2006:76-90.
|
[15] |
MORADI A , MISCHKE O , EISENBARTH T . Correlation-enhanced power analysis collision attack[C]//International Workshop on Cryp-tographic Hardware and Embedded Systems. 2010:125-139.
|
[16] |
杜之波, 吴震, 王敏 , 等. 针对 SM4 轮输出的改进型选择明文功耗分析攻击[J]. 通信学报, 2015,36(10):85-91. DU Z B , WU Z , WANG M , et al. Improved chosen-plaintext power analysis attack against SM4 at the round-output[J]. Journal on Com-munications, 2015,36(10):85-91.
|
[17] |
王敏, 杜之波, 吴震 , 等. 针对 SMS4 轮输出的选择明文能量析攻击[J]. 通信学报, 2015,36(1):20150016. WANG M , DU Z B , WU Z , et al. Chosen-plaintext power analysis at-tack against SMS4 with the round-output as the intermediate data[J]. Journal on Communications, 2015,36(1):20150016.
|
[18] |
杜之波, 吴震, 王敏 , 等. 针对SM4密码算法的多点联合能量分析攻击[J]. 计算机研究与发展, 2016,53(10):2224-2229. DU Z B , WU Z , WANG M , et al. Multi-point joint power analysis at-tack against SM4[J]. Journal of Computer Research and Development, 2016,53(10):2224-2229.
|
[19] |
MANGARD S , OSWALD E , POPP T . Power analysis attacks:reveal-ing the secrets of smart cards[M]. Berlin:Springer, 2008.
|
[20] |
杜之波, 吴震, 王敏 , 等. 针对基于 SM3 的 HMAC 的能量分析攻击方法[J]. 通信学报, 2016,37(5):38-43. DU Z B , WU Z , WANG M , et al. Power analysis attack of HMAC based on SM3[J]. Journal on Communications, 2016,37(5):38-43.
|