[1]Kocher P, Jaffe J, Jun B. Differential power analysis[C]∥Proc of 1999 International Conference on Asvances in Cryptology,1666:388-397.
[2]Mangard S,Pramstaller N,Oswald E.Successfully attacking masked AES hardware implementations[C]∥Proc of Cryptographic Hardware and Embedded Systems(CHES’05),2005.157-171.
[3]Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
[4]Liu H, Qian G, Goto S, et al. Correlation power analysis based on switching glitch model[M]∥Information Security Applications.Berlin:Springer,2011:191-205.
[5]Coron J S,Prouff E,Roche T.On the use of shamir’s secret sharing against side-channel analysis[M].Berlin:Springer,2013.
[6]Nikova S,Rechberger C,Rijmen V.Threshold implementat-
ions against side-channel attacks and glitches[M]∥Information and Communications Security.Berlin:Springer,2006:529-545.
[7]Nikova S,Rijmen V,Schlffer M.Secure hardware implementation of nonlinear functions in the presence of glitches[J].Journal of Cryptology,2011,24(2):292-321.
[8]Wu Wen-ling, Feng Deng-guo, Zhang Wen-tao. The design and analysis of block cipher[M].2nd Edition.Beijng:Tsinghua University Press,2009.(in Chinese)
[9]Luo Peng,Feng Deng-guo,Zhou Yong-bin.Power model in power analysis attack.[J].Journal on Communications,2012,33(S1):276-281.(in Chinese)
[10]Micali S, Reyzin L. Physically observable cryptography [C]∥Proc of 2004 International Conference on Theory of Cryptography (TCC 2004), 2004:278-296.
[11]Chari S,Rao J R,Rohatgi P.Template attacks [C]∥Proc of Cryptographic Hardware and Embedded Systems(CHES’02),2002:13-28.
[12]Li Pei-zhi. Research on template attack techniques against DES cryptographic chip[J].Computer Applications and Sofeware,2014,30(4):310-313.(in Chinese)
[13]Yang Jun,Yu Jiang,Zhao Zheng-peng.The design and application of cryptographic technology based on the FPGA[M].Beijing:Electronic Industry Press,2012:45-65.(in Chinese)
附中文参考文献:
[8]吴文玲,冯登国,张文涛.分组密码的设计与分析[M].第2版.北京:清华大学出版社,2009.
[9]罗鹏,冯登国,周永彬.功耗分析攻击中的功耗与数据相关性模型[J].通信学报,2012,33(S1):276-281.
[12]李佩之.DES密码芯片模板攻击技术研究[J].计算机应用与软件,2013(30):310-313.
[13]杨军,余江,赵征鹏.基于FPGA密码技术的设计与应用[M].北京:电子工业出版社,2012:45-65.
|