[1] KOCHER P C.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[C]//Proceedings of the 16th Annual International Cryptology Conference.Berlin,Germany:Springer,1996:104-113. [2] KOCHER P,JAFFE J,JUN B.Differential power analysis[C]//Proceedings of the 19th Annual International Cryptology Conference.Berlin,Germany:Springer,1999:388-397. [3] CHARI S,RAO J R,ROHATGI P.Template attacks[C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2002:13-28. [4] BRIER E,CLAVIER C,OLIVIER F.Correlation power analysis with a leakage model[C]//Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2004:16-29. [5] NIST.Common criteria for information technology security evaluation:CCMB-2017-04-001[S].Gaithersburg,USA:NIST,2017. [6] NIST.Common criteria for information technology security evaluation:CCMB-2017-04-004[S].Gaithersburg,USA:NIST,2017. [7] GOODWILL G,JUN B,JAFFE J,et al.A testing methodology for side channel resistance validation[C]//Proceedings of NIAT'11.Gaithersburg,USA:NIST,2011:1-15. [8] JAFFE J,ROHATGI P,WITTEMAN M.Efficient side-channel testing for public key algorithms:RSA case study[EB/OL].[2020-03-10].https://csrc.nist.gov/csrc/media/events/non-invasive-attack-testing-workshop/documents/09_jaffe.pdf. [9] CHEN Jiazhe,LI Hexin,WANG Yanan,et al.Evaluating side-channel information leakage in 3DES using the t-test[J].Journal of Tsinghua University(Science and Technology),2016,56(5):499-503.(in Chinese)陈佳哲,李贺鑫,王亚楠,等.运用t检验评估3DES算法的侧信道信息泄露[J].清华大学学报(自然科学版),2016,56(5):499-503. [10] CHOTHIA T,GUHA A.A statistical test for information leaks using continuous mutual information[C]//Proceedings of IEEE Computer Security Foundations Symposium.Washington D.C.,USA:IEEE Computer Society,2011:177-190. [11] CHATZIKOKOLAKIS K,CHOTHIA T,GUHA A.Statistical measurement of information leakage[C]//Proceedings of the 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems.Paphos,Cyprus:DBLP,2010:390-404. [12] HE Tong,XIONG Fengguang,HAN Xie,et al.A feature curve extraction algorithm for point cloud based on covariance matrix[J].Computer Engineering,2018,44(3):275-280,286.(in Chinese)贺彤,熊风光,韩燮,等.一种基于协方差矩阵的点云特征曲线提取算法[J].计算机工程,2018,44(3):275-280,286. [13] WANG Wensen.Coefficient of variation-a simple but useful statistical measure of dispersion[J].China Statistics,2007(6):43-44.(in Chinese)王文森.变异系数——一个衡量离散程度简单而有用的统计指标[J].中国统计,2007(6):43-44. [14] STEFAN M,ELISABETH O,THOMAS P.Power analysis attack[M].Berlin,Germany:Springer,2007. [15] FAN Guangjun,ZHOU Yongbin,ZHANG Hailong,et al.How to choose interesting points for template attacks more effectively?[C]//Proceedings of International Conference on Trusted Systems.Berlin,Germany:Springer,2014:168-183. [16] Télécom ParisTech.DPA contest v2[EB/OL].[2020-03-10].http://www.dpacontest.org/v2/index.php. [17] TROCHE Co.,Ltd.SAKURA-G specification ver.1.0[EB/OL].[2020-03-10].http://satoh.cs.uec.ac.jp/SAKURA/hardware/SAKURA-G_Spec_Ver1.0_English.pdf. [18] Télécom ParisTech.DPA contest v4[EB/OL].[2020-03-10].http://www.dpacontest.org/v4/index.php. [19] Akashi Satoh.AES design[EB/OL].[2020-03-10].http://www.dpacontest.org/v2/data/aist-aes_patched_24MHz.tar.gz. [20] TROCHE Co.,Ltd.SAKURA-G quick start guide source and binary codes[EB/OL].[2020-03-10].http://satoh.cs.uec.ac.jp/SAKURA/hardware/sakura_g_aes_r2.zip. |