[1] |
KOCHER P , JAFFE J , JUN B . Differential power analysis[C]// Annual International Cryptology Conference. 1999: 388-397.
|
[2] |
POPP T , MANGARD S , OSWALD E . Power analysis attacks and countermeasures[J]. IEEE Design & test of Computers, 2007,24(6): 535-543.
|
[3] |
MESSERGES T , . Using second-order power analysis to attack DPA resistant software[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2000: 238-251.
|
[4] |
WADDLE J , WAGNER D . Towards efficient second-order power analysis[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2004: 1-15.
|
[5] |
JOYE M , PAILLIER P , SCHOENMAKERS B . On second-order differential power analysis[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2005: 293-308.
|
[6] |
王敏, 吴震, 饶金涛 ,等. 针对密码芯片频域互信息能量分析攻击[J]. 通信学报, 2015,36(Z1): 131-135.
|
|
WANG M , WU Z , RAO J T ,et al. Mutual information power analysis attack in the frequency domain of the crypto chip[J]. Journal on Communications, 2015,36(Z1): 131-135.
|
[7] |
OSWALD E , MANGARD S , HERBST C ,et al. Practical second-order DPA attacks for masked smart card implementations of block ciphers[C]// Cryptographers’ Track at the RSA Conference. 2006: 192-207.
|
[8] |
OSWALD E , MANGARD S . Template attacks on masking—resistance is futile[C]// Cryptographers’ Track at the RSA Conference. 2007: 243-256.
|
[9] |
LEMKE-RUST K , PAAR C . Gaussian mixture models for higher-order side channel analysis[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2007: 14-27.
|
[10] |
LERMAN L , BONTEMPI G , MARKOWITCH O . A machine learning approach against a masked AES[J]. Journal of Cryptographic Engineering, 2015,5(2): 123-139.
|
[11] |
GILMORE R , HANLEY N , O'NEILL M . Neural network based attack on a masked implementation of AES[C]// 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 2015: 106-111.
|
[12] |
DURVAUX F , STANDAERT F X . From improved leakage detection to the detection of points of interests in leakage traces[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2016: 240-262.
|
[13] |
DURVAUX F , STANDAERT F X , VEYRAT-CHARVILLON N , ,et al. Efficient selection of time samples for higher-order DPA with projection pursuits[C]// International Workshop on Constructive SideChannel Analysis and Secure Design. 2015: 34-50.
|
[14] |
张洪欣, 李静, 张帆 ,等. 基于能耗旁路泄露的密码芯片模板攻击算法研究[J]. 电波科学学报, 2015,30(5): 987-992.
|
|
ZHANG H X , LI J , ZHANG F ,et al. A study on template attack of chip base on side channel power leakage[J]. Chinese Journal of Radio Science, 2015,30(5): 987-992.
|
[15] |
阮越, 陈汉武, 刘志昊 ,等. 量子主成分分析算法[J]. 计算机学报, 2014,37(3): 666-676.
|
|
WAN Y , CHEN H W , LIU Z H ,et al. Quantum principal component analysis algorithm[J]. Chinese Journal of Computers, 2014,37(3): 666-676.
|