KOCHER P,JAFFE J,JUN B.Differential power analysis[C]//Advances in Cryptology—CRYPTO'99.Berlin:Springer,1999:388-397.http://dx.doi.org/10.1007/3-540-48405-1_25.
[2]
罗鹏,冯登国,周永彬.功耗分析攻击中的功耗与数据相关性模型[J].通信学报,2012,33:276-281.LUO P,FENG D G,ZHOU Y B.Power model in power analysis attack[J].Journal on Communications,2012,33:276-281(Ch).
[3]
CHEN Z,ZHOU Y.Dual-rail random switching logic:A Countermeasure to Reduce Side Channel Leakage[C]//Cryptographic Hardware and Embedded Systems-CHES 2006.Berlin:Springer,2006:242-254.
[4]
WANG D H,WANG A,ZHENG X X.Fault-tolerant linear collision attack:A combination with correlation power analysis[C]//ISPEC 2014 Proceedings of the10th International Conference on Information Security Practice and Experience.New York:Springer-Verlag,2014:232-246.DOI:10.1007/978-3-319-06320-1_18.
[5]
GANDOLFI K,MOURTEL C,OLIVIER F.Electromagnetic analysis:Concrete results[C]//International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2001:251-261.
[6]
KOCHER P C.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[C]//Advances in Cryptology—CRYPTO'96.Berlin:Springer-Verlag,1996:104-113.
童元满,王志英,戴葵,等.一种抗DPA及HO-DPA攻击的AES算法实现技术[J].计算机研究与发展,2009,46(3):377-383.TONG Y M,WANG Z Y,DAI K,et al.A DPA and HO-DPA resistant implementation of AES[J].J ournal of Computer Research and Development.2009,46(3):377-383(Ch).
[9]
BRIER E,CLAVIER C,OLIVIER F.Correlation power analysis with a leakage model[C]//Cryptographic Hardware and Embedded Systems-CHES2004.Berlin:Springer,2004:16-29.http://dx.doi.org/10.1007/978-3-540-28632-5_2.
[10]
BAI X F,GUO L,XU YH,et al.Research on differential power analysis attack on SM4 algorithm[J].Journal of Chinese Computer Systems,2009,30(3):541-544.
[11]
TAN R N,LU YY,TIAN J L.SM4 muti-path multiplicative masking method against side-channel attack[J].Computer Engineering,2014,40(5):130-108.