参考文献
[1]Peng Jie,Wu Quanshui,Kan Haibin.On Symmetric Boolean Functions with High Algebraic Immunity on Even Number of Variables[J].IEEE Transactions on Information Theory,2011,57(10):7205-7220.
[2]Peng Jie,Kan Haibin.The Degree of Two Classes of 3rd Order Correlation Immune Symmetric Boolean Funct-ions[J].IEICE Transactions on Fundamentals,2014,97(1):365-370.
[3]Renauld M,Standaert F X.Algebraic Side-channel Attacks[C]//Proceedings of International Conference on Information Security & Cryptology.Berlin,Germany:Springer,2009:393-410.
[4]Yap Hui-hui,Khoo Khoong-ming,Poschmann A,et al.EPCBC——A Block Cipher Suitable for Electronic Product Code Encryption[C]//Proceedings of International Conference on Cryptology and Network Security.Berlin,Germany:Springer,2011:76-97.
[5]Soos M,Nohl K,Castelluccia C.Extending SAT Solvers to Cryptographic Problems[C]//Proceedings of the 12th International Conference on Theory and Applications of Satisfiability Testing.New York,USA:ACM Press,2009:244-257.
(下转第168页)
(上接第160页)
[6]Chari S,Rao J R,Rohatgi P.Template Attacks[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2002:13-28.
[7]Schramm K,Leander G,Felke P,et al.A Collision-attack on AES[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2004:163-175.
[8]刘会英,赵新杰,王韬,等.基于汉明重的SMS4密码代数旁路攻击研究[J].计算机学报,2013,36(6):1183-1193.
[9]冀可可,王韬,郭世泽,等.基于汉明重的LED代数旁路攻击研究[J].通信学报,2013,34(7):134-142.
[10]陈浩,王韬,张帆,等.HIGHT密码代数故障分析[J].上海交通大学学报,2015,49(12):1817-1825.
[11]Faugere J C.A New Efficient Algorithm for Computing Grbner Bases (F_4)[J].Journal of Pure and Applied Algebra,1999,139(1):61-88.
[12]Achterberg T.Constraint Integer Programming[M].Berlin,Germany:Springer,2007.
[13]Bogdanov A,Knudsen L R,Leander G,et al.PRESENT:An Ultra-lightweight Block Cipher[C]//Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems.New York,USA:ACM Press,2007:450-466.
[14]Biryukov A,Cannière C.Block Ciphers and Systems of Quadratic Equations[C]//Proceedings of International Workshop on Fast Software Encryption.Berlin,Germany:Springer,2003:274-289.
[15]吴克辉,王韬,赵新杰,等.基于汉明重的PRESENT密码代数旁路攻击[J].计算机科学,2011,38(12):53-56.
[16]吴克辉,王韬,赵新杰,等.基于碰撞模型的PRESENT密码代数旁路攻击[J].计算机工程与设计,2012,33(8):2936-2942.
[17]Knudsen L R,Miolane C V.Counting Equations in Algebraic Attacks on Block Ciphers[J].International Journal of Information Security,2010,9(2):127-135.
[18]Mangard S,Oswald E,Popp T.Power Analysis Attacks:Revealing the Secrets of Smart Cards[M].Berlin,Germany:Springer,2008.
[19]蔡琛,陈运,万武南,等.基于主成分分析的AES算法相关功耗分析攻击[J].电子技术应用,2015,41(8):101-105.
编辑顾逸斐 |