[1] LI Lang.Research on power analysis attacks and defense issues of block ciphers chip[D].Changsha:Hunan University,2010.(in Chinese) 李浪.分组密码芯片功耗攻击与防御问题研究[D].长沙:湖南大学,2010. [2] YANG Jing.Differential power analysis and countermeasures on ultra-lightweight block cipher——PRESENT[D].Chengdu:Southwest Jiaotong University,2013.(in Chinese) 杨静.超轻量级密码PRESENT的差分功耗攻击及其防护[D].成都:西南交通大学,2013. [3] GU Xingyuan.Research on resistance to side channel attack in software implemented cryptographic system[D].Shanghai:Shanghai Jiao Tong University,2013.(in Chinese) 顾星远.软件实现的密码系统的旁路攻击防护研究[D].上海:上海交通大学,2013. [4] KOCHER P,JAFFE J,JUN B.Differential power analysis[C]//Proceedings of the 19th Annual Inter-national Cryptology Conference on Advances in Cryptology.Berlin,Germany:Springer,1999:388-397. [5] HUANG Luyun.Principle and simulation of differential power analysis attack based on AES encryption device[J].Information Technology,2013(12):170-173.(in Chinese) 黄露昀.AES加密设备的差分能量攻击原理与仿真[J].信息技术,2013(12):170-173. [6] LI Peizhi.The research on template attack for block cipher chips[D].Zhengzhou:PLA University of Information Engineering,2013.(in Chinese) 李佩之.分组密码芯片模板攻击关键技术研究[D].郑州:解放军信息工程大学,2013. [7] BRIER E,CLAVIER C,OLIVIER F.Correlation power analysis with a leakage model[C]//Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems.Washington D.C.,USA:IEEE Press,2004:11-13. [8] WHITNALL C,OSWALD E,FRANÇOIS-XAVIER S.The myth of generic DPA…and the magic of learning[EB/OL].[2018-11-05].https://eprint.iacr.org/2012/256.pdf. [9] HOSPODAR G,GIERLICHS B,MULDER E D,et al.Machine learning in side-channel analysis:a first study[J].Journal of Cryptographic Engineering,2011,1(4):293-302. [10] LERMAN L,MEDEIROS S F,VESHCHIKOV N,et al.Semi-supervised template attack[C]//Proceedings of the 4th International Conference on Constructive Side-Channel Analysis and Secure Design.Berlin,Germany:Springer,2013:256-263. [11] LERMAN L,BONTEMPI G,MARKOWITCH O.A machine learning approach against a masked AES[J].Journal of Cryptographic Engineering,2015,5(2):123-139. [12] CHEN Zhimin.Side channel power analysis on secure integrated circuits and countermeasures[D].Shanghai:Shanghai Jiao Tong University,2006.(in Chinese) 陈志敏.安全芯片旁路功耗分析及抗攻击措施[D].上海:上海交通大学,2006. [13] MANGARD S,OSWALD E,POPP T.Power analysis attacks[EB/OL].[2018-11-05].http://www.springerlink.com/content/g01q1k. [14] MANGARD S,OSWALD E,POPP T.Energy analysis attack[M].Translated by FENG Dengguo,ZHOU Yongbin,LIU Jiye.Beijing:Science Press,2010.(in Chinese) MANGARD S,OSWALD E,POPP T.能量分析攻击[M].冯登国,周永彬,刘继业,译.北京:科学出版社,2010. [15] WANG Yunfeng.Research on chaos based cryptography and key technologies[D].Hangzhou:Zhejiang University,2006.(in Chinese) 王云峰.基于混沌的密码算法及关键技术研究[D].杭州:浙江大学,2006. [16] MAO Jinliang.Design and implementation of dynamic clock-gating management strategy[D].Nanjing:Southeast Uni-versity,2014.(in Chinese)茅锦亮.动态时钟门控管理策略的设计与实现[D].南京:东南大学,2014. [17] LE Daheng.Research on circuit-level design against power analysis attack for cryptographic chip[D].Changsha:National University of Defense Science and Technology,2011.(in Chinese)乐大珩.抗功耗攻击的密码芯片电路级防护关键技术研究[D].长沙:国防科技大学,2011. [18] HAN Xueyang.Improved correlation energy analysis attack based on preprocessing energy trace[D].Jinan:Shandong University,2016.(in Chinese)韩学洋.基于预处理能量迹的改进相关能量分析攻击[D].济南:山东大学,2016. [19] CHU Jie,DING Guoliang,DENG Gaoming,et al.Design and realization of differential power analysis for DES[J].Journal of Chinese Computer Systems,2007,28(11):2070-2073.(in Chinese)褚杰,丁国良,邓高明,等.DES差分功耗分析攻击设计与实现[J].小型微型计算机系统,2007,28(11):2070-2073. [20] WANG Pengjun,HAO Lipeng,ZHANG Yuejun.Design of AES subbyte module of anti-zero value power attack and its VLSI implementation[J].Acta Electronica Sinica,2012,40(11):2183-2187.(in Chinese)汪鹏君,郝李鹏,张跃军.防御零值功耗攻击的AES SubByte模块设计及其VLSI实现[J].电子学报,2012,40(11):2183-2187. [21] LU Langru,KUANG Youhua,YANG Qianghao,et al.How to implement AES by using FPGA[J].Computer and Communications,2001,19(5):14-17.(in Chinese)陆浪如,匡友华,杨强浩,等.AES算法的FPGA实现[J].交通信息与安全,2001,19(5):14-17. |