参考文献 [1]谭锐能,卢元元,田椒陵.抗侧信道攻击的SM4多路径乘法掩码方法[J].计算机工程,2014,40(5):103-108. [2]CHAIR S,JUTLA C S,RAO J R,et al.Towards Sound Approaches to Counteract Power-analysis Attacks[C]//Proceedings of IEEE CRYPTO’99.Washington D.C.,USA:IEEE Press,1999:398-412. [3]JOVAN D.TYMEN C.Multiplicative Masking and Power Analysis of AES[C]//Proceedings of Inter-national Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer-Verlag,2002:31-47. [4]徐佩,傅鹂.防止差分功耗分析攻击的软件掩码方案[J].计算机应用研究,2016(1):245-248. [5]MESSERGES T S.Using Second-order Power Analysis to Attack DPA Resistant Software[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer-Verlag,2000:238-251. [6]AKKAR M L,GOUBIN L.A Generic Protection Against High-order Differential Power Analysis[C]//Proceedings of International Workshop on Fast Software Encryption.Washington D.C.,USA:IEEE Press,2003:192-205. [7]JOYE M,PAILLIER P,SCHOENMAKERS B.On Second-order Differential Power Analysis[C]//Proceedings of International Workshop on Cryptographic Hardware & Embedded Systems.Washington D.C.,USA:IEEE Press,2005:293-308. [8]Herbst C,Oswald E,Mangard S.An AES Smart Card Implementation Resistant to Power Analysis Attacks[C]// Proceedings of International Conference on Applied Cryptography and Network Security.Berlin,Germany:Springer-Verlag,2006:194-206. [9]OSEALD E,MANGARD S,HERBST C,et al.Practical Second-order DPA Attacks for Masked Smart Card Implementations of Block Ciphers[M].Berlin,Germany:Springer-Verlag,1970. [10]YOO H S,HERBST C,MANGARD S,et al.Investigations of Power Analysis Attacks and Counter-measures for ARIA[J].Lecture Notes in Computer Science,2007,4298:160-172. [11]DING A A,ZHANG L,FEI Y,et al.A Statistical Model for Higher Order DPA on Masked Devices[C]//Proceedings of CHES’14.Berlin,Germany:Springer-Verlag,2014:147-169. [12]DURVAUX F,STANDAERT F X.Efficient Selection of Time Samples for Higher-order DPA with Projection Pursuits[M].Berlin,Germany:Springer-Verlag,2015. [13]IYOH K,TAKENAKA M,TORII N.DPA Counter-measure Based on the “Masking Method”[C]//Proceedings of International Conference Seoul on Info-rmation Security & Cryptology.Washington D.C.,USA:IEEE Press,2001:440-456. [14]WADDLE J,WAGNER D.Towards Efficient Second-order Power Analysis[J].Lecture Notes in Computer Science,2004,3156:1-15. [15]赵东艳,何军.针对密码算法的高阶DPA攻击方法研究[J].电子技术应用,2013,39(10):56-58. 编辑索书志 |