[1] KOCHER P C.Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C]//Proceedings of International Cryptology Conference on Advances in Cryptology.Berlin, Germany:Springer, 1996:104-113. [2] KOCHER P, JAFFE J, JUN B.Differential power analysis[C]//Proceedings of International Cryptology Conference on Advances in Cryptology.Berlin, Germany:Springer, 1999:388-397. [3] SCHRAMM K, WOLLINGER T, PAAR C.A new class of collision attacks and its application to DES[M].Berlin, Germany:Springer, 2003. [4] BRIER E, CLAVIER C, OLIVIER F.Correlation power analysis with a leakage model[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin, Germany:Springer, 2004:16-29. [5] CHARI S, RAO J R, ROHATGI P.Template attacks[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin, Germany:Springer, 2002:13-28. [6] 戴立, 胡红钢.免触发信号的侧信道加解密区间定位方法[J].信息网络安全, 2019, 19(3):43-51. DAI L, HU H G.Encryption and decryption interval locating method for non-trigger side-channel analysis[J].Netinfo Security, 2019, 19(3):43-51.(in Chinese) [7] 王恺, 郭朋飞, 周聪, 等.基于t检验的侧信道信息泄漏评估方法研究[J].信息网络安全, 2020, 20(10):57-66. WANG K, GUO P F, ZHOU C, et al.Research on the assessment method of side channel information leakage based on t-test[J].Netinfo Security, 2020, 20(10):57-66.(in Chinese) [8] 凌杭, 吴震, 杜之波, 等.基于汉明重的EPCBC代数侧信道攻击[J].计算机工程, 2017, 43(8):156-160, 168. LING H, WU Z, DU Z B, et al.Algebraic side channel attack against EPCBC based on hamming weight[J].Computer Engineering, 2017, 43(8):156-160, 168.(in Chinese) [9] SCHRAMM K, LEANDER G, FELKE P, et al.A collision-attack on AES[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin, Germany:Springer, 2004:163-175. [10] BOGDANOV A.Improved side-channel collision attacks on AES[C]//Proceedings of International Workshop on Selected Areas in Cryptography.Berlin, Germany:Springer, 2007:84-95. [11] MESSERGES T S.Securing the AES finalists against power analysis attacks[C]//Proceedings of International Workshop on Fast Software Encryption.Berlin, Germany:Springer, 2000:150-164. [12] HERBST C, OSWALD E, MANGARD S.An AES smart card implementation resistant to power analysis attacks[C]//Proceedings of International Conference on Applied Cryptography and Network Security.Berlin, Germany:Springer, 2006:239-252. [13] AKKAR M L, GIRAUD C.An implementation of DES and AES, secure against some attacks[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin, Germany:Springer, 2001:309-318. [14] HUANG H, LIU L B, HUANG Q H, et al.Low area-overhead Low-Entropy Masking Scheme(LEMS) against correlation power analysis attack[J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2019, 38(2):208-219. [15] 谭锐能, 卢元元, 田椒陵.抗侧信道攻击的SM4多路径乘法掩码方法[J].计算机工程, 2014, 40(5):103-108, 114. TAN R N, LU Y Y, TIAN J L.SM4 multi-path multiplicative masking method against side-channel attack[J].Computer Engineering, 2014, 40(5):103-108, 114.(in Chinese) [16] 张翌维, 龚冰冰, 刘烈恩, 等.抵御侧信道分析的AES双路径掩码方法[J].计算机工程, 2012, 38(13):108-111. ZHANG Y W, GONG B B, LIU L E, et al.AES dual-path masking method for resisting side-channel analysis[J].Computer Engineering, 2012, 38(13):108-111.(in Chinese) [17] MORADI A, MISCHKE O, EISENBARTH T.Correlation-enhanced power analysis collision attack[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin, Germany:Springer, 2010:125-139. [18] CLAVIER C, FEIX B, GAGNEROT G, et al.Improved collision-correlation power analysis on first order protected AES[C]//Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems.Berlin, Germany:Springer, 2011:49-62. [19] BOGDANOV A, KIZHVATOV I.Beyond the limits of DPA:combined side-channel collision attacks[J].IEEE Transactions on Computers, 2012, 61(8):1153-1164. [20] NIU Y C, ZHANG J W, WANG A, et al.An efficient collision power attack on AES encryption in edge computing[J].IEEE Access, 2019, 7:18734-18748. [21] DING Y L, SHI Y, WANG A, et al.Adaptive chosen-plaintext collision attack on masked AES in edge computing[J].IEEE Access, 2019, 7:63217-63229. [22] ZHENG D, JIA X, ZHANG M L.Hypothesis testing based side-channel collision analysis[J].IEEE Access, 2019, 7:104218-104227. [23] O'FLYNN C, CHEN Z.ChipWhisperer:an open-source platform for hardware embedded security research[C]//Proceedings of International Workshop on Constructive Side-Channel Analysis and Secure Design.Berlin, Germany:Springer, 2014:243-260. |