[1] CHARI S,RAO J R,ROHATGI P.Template attacks[EB/OL].[2020-01-15].https://www.semanticscholar.org/paper/Template-Attacks-Chari-Rao/f7a0d42044b26be8d509310ba20fd8d665943eba?p2df. [2] MANGARD S,OSWALD E,POPP T.Power analysis attacks[M].Translated by FENG Dengguo,ZHOU Yongbin,LIU Jiye,et al.Beijing:Science Press,2010.(in Chinese) MANGARD S,OSWALD E,POPP T.能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010. [3] OSWALD E.Enhancing simple power-analysis attacks on elliptic curve cryptosystems[J].Cryptographic Hardware and Embedded Systems,2002,2523:82-97. [4] BRIER E,CLAVIER C,OLIVIER F.Correlation power analysis with a leakage model[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2004:16-29. [5] KOCHER P C,JAFFE J,JUN B.Differential power analysis[M].Berlin,Germany:Springer,2007. [6] ZHANG Shaohui,WU Liji,ZHANG Xiangmin,et al.A template attack-resistant masking scheme for RC4 based on FPGA[C]//Proceedings of the 11th International Conference on Computational Intelligence and Security.Washington D.C.,USA:IEEE Press,2015:16-25. [7] HU Yongbo,ZHENG Yeyang,YU Jun.A new template attack method of advanced encryption standard[J].Computer Engineering,2013,39(8):166-168.(in Chinese)胡永波,郑业扬,俞军.一种新的高级加密标准模板攻击方法[J].计算机工程,2013,39(8):166-168. [8] EISENBARTH T,KUMAR S.A survey of lightweight-cryptography implementations[J].IEEE Design & Test of Computers Magazine,2007,24(6):522-533. [9] BANIK S,PANDEY S K,PEYRIN T,et al.GIFT:a small present[C]//Proceedings of International Conference on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2017:15-29. [10] ZHUKOV A.Lightweight cryptography:modern development paradigms[EB/OL].[2020-01-15].https://dl.acm.org/doi/epdf/10.1145/2799979.2799981. [11] JAGDISH P,GAURAV B,KUMAR S K.DoT:a new ultra-lightweight SP network encryption design for resource-constrained environment[C]//Proceedings of International Conference on Data Engineering and Communication Technology.Berlin,Germany:Springer,2019:145-169. [12] YANG G,ZHU B,SUDER V,et al.The simeck family of lightweight block ciphers[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2015:125-148. [13] NECHVATAL J,BARKER E,BASSHAM L,et al.Report on the development of the advanced encryption standard[J].Journal of Research of the National Institute of Standards and Technology,2001,106(3):14-25. [14] MATSUI M.Linear cryptanalysis method for DES cipher[M].Berlin,Germany:Springer,1994. [15] BIHAM E,SHAMIR A.Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptology,1991,4(1):3-72. [16] KOCHER P C.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[C]//Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology.Berlin,Germany:Springer,1999:598-631. [17] KELSEY J,SCHNEIER B,WAGNER D,et al.Side channel cryptanalysis of product ciphers[C]//Proceedings of European Symposium on Research in Computer Security.Berlin,Germany:Springer,1998:455-468. [18] GANDOLFI K,MOURTEL C,OLIVIER F.Electromagnetic analysis:concrete results[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2001:251-261. [19] OU Changhai,WANG Zhu,HUANG Weiqing,et al.Amplified template attacks on cryptographic devices using Hamming weight model[J].Journal of Cryptologic Research,2015,2(5):477-486.(in Chinese)欧长海,王竹,黄伟庆,等.基于汉明重量模型的密码设备放大模板攻击[J].密码学报,2015,2(5):477-486. [20] TIAN Long,LIU Zongtian.Piecewise line fitting with least square method[J].Computer Science,2012,39(S1):482-484.(in Chinese)田垅,刘宗田.最小二乘法分段直线拟合[J].计算机科学,2012,39(S1):482-484. [21] ENDERLEIN J.Maximum-likelihood criterion and single-molecule detection[J].Applied Optics,1995,34(3):514-515. [22] STANDAERT F,ROUVROY G,QUISQUATER J J.FPGA implementations of the DES and triple-DES masked against power analysis attacks[EB/OL].[2020-02-15].https://static.aminer.org/pdf/PDF/000/214/572/design_strategies_and_modified_descriptions_to_optimize_cipher_fpga_implementations.pdf. [23] NORBERT P,ELISABETH O,STEFAN M.A masked AES ASIC implementation[EB/OL].[2020-02-15].https://www.semanticscholar.org/paper/A-Masked-AES-ASIC-Implementation-%E2%88%97-Pramstaller-Oswald/935f6b3b0489de79ddcee51bb4c8741dde5b3c40. |