参考文献 [1] Kocher P C. Timing Attacks on Implementations of Diffie- Hellman, RSA, DSS, and Other Systems[C]//Proc. of CRYPTO’96. Berlin, Germany: Springer, 1996: 104-113. [2] Kocher P, Jaffe J, Jun B. Differential Power Analysis[C]// Proc. of CRYPTO’96. Berlin, Germany: Springer, 1996: 388-397. [3] Itoh K, Takenaka M, Torii N. DPA Countermeasure Based on the “Masking Method”[C]//Proc. of ICISC’02. Berlin, Germany: Springer, 2002: 440-456. [4] Bl?mer J, Guajardo J, Krummel V. Provably Secure Masking of AES[C]//Proc. of SAC’05. Berlin, Germany: Springer, 2005: 69-83. [5] Prouff E, Giraud C. Provably Secure S-box Implementation Based on Fourier Transform[C]//Proc. of CHES’06. Berlin, Germany: Springer, 2006: 216-230. [6] Coron J S, Giraud C, Prouff E, et al. Attack and Improvement of a Secure S-box Calculation Based on Fourier Trans- form[C]//Proc. of CHES’08. Berlin, Germany: Springer, 2008: 1-14. [7] Coron J S, Tchulkine A. A New Algorithm for Switching from Arithmetic to Boolean Masking[C]//Proc. of CHES’03. Berlin, Germany: Springer, 2003: 89-97. [8] Goubin L. A Sound Method for Switching Between Boolean and Arithmetic Masking[C]//Proc. of CHES’01. Berlin, Germany: Springer, 2001: 3-15. [9] 冯登国. 信息安全中的数学方法[M]. 北京: 清华大学出版社, 2009. [10] Li Y, Sakiyama K, Kawamura S, et al. Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform[M]. Berlin, Germany: Springer, 2009: 3-16. [11] National Bureau of Standards. FIPS PUB-46-1977 The Data Encryption Standard[S]. 1977. [12] Research Institute for Secure Systems. Side-channel Attack Standard Evaluation Board[EB/OL]. (2010-04-05). http:// www.risec.aist.go.jp/project/sasebo/. 编辑 索书志 |