参考文献
[1]Paul K,Jaffe J,Jun B.Differential Power Analysis[C]//Proceedings of CRYPTO’99.Berlin,Germany:Springer,1999:388-397.
[2]Kocher P,Jaffe J,Jun B,et al.Introduction to Differential Power Analysis and Related Attacks[J].Journal of Cryptographic Engineering,2011,1(1):5-27.
[3]Brier E,Clavier C,Olivier F.Correlation Power Analysis with a Leakage Model[M]//Joye M,Quisquater J.Cryptographic Hardware and Embedded Systems-CHES 2004.Berlin,Germany:Springer,2004:16-29.
[4]Rohatgi S,Rao J R,Rohatgi P.Template Attacke[C]//Proceedings of the 8th International Conference on Cryptographic Hardware and Embedded System.Yokohama,Japan:[s.n.],2002:13-28.
[5]Aigner M,Oswald E,Aigner M.Power Analysis Tutorial[D].Graz,Austria:University of Technology Graz,2000.
[6]Gebotys C H,Ho S,Tiu C C.EM Analysis of Rijndael and ECC on a Wireless Java-based PDA[M]//Rao J R,Sunar B.Cryptographic Hardware and Embedded Systems-CHES 2005.Berlin,Germany:Springer,2005:250-264.
[7]Waddle J,Wagner D.Towards Efficient Second-order Power Analysis[M]//Joye M,Quisquater J.Crypto-graphic Hardware and Embedded Systems-CHES 2004.Berlin,Germany:Springer,2004:1-15.
[8]Herbst C,Oswald E,Mangard S.An AES Smart Card Implementation Resistant to Power Analysis Attacks[M]//Katz J,Yung M.Applied Cryptography and Network Security.Berlin,Germany:Springer,2006:239-252.
[9]Oswald E,Mangard S,Herbst C,et al.Practical Second-order DPA Attacks for Masked Smart Card Implementa-tions of Block Ciphers[M]//Pointcheval D.Topics in Cryptology-CT-RSA 2006.Berlin,Germany:Springer,2006:192-207.
[10]Manged S.Oswald E,Popp T.能量分析攻击[M].冯登国,周永彬,刘继业,译.北京:科学出版社,2010.
[11]王安,于艳艳,陈曼,等.对一种纵向重用型AES掩码的能量分析攻击[J].密码学报,2014,1(1):91-99.
[12]王先培,张爱菊,熊平,等.新一代数据加密标准——AES[J].计算机工程,2003,29(3):69-70.
[13]Wolkerstorfer J,Oswald E,Lamberger M.An ASIC Implementation of the AES SBoxes[M]//Preneel B.Topics in Cryptology-CT-RSA 2002.Berlin,Germany:Springer,2002:67-78.
[14]Canright D.A Very Compact S-box for AES[M].Berlin,Germany:Springer,2005.
[15]Chari S,Jutla C S,Rao J R,et al.Towards Sound Approaches to Counteract Power-analysis Attacks[C]//Proceedings of CRYPTO’ 99.Berlin,Germany:Springer,1999:398-412.
编辑金胡考 |