[1] 杜之波, 吴震, 王敏, 等. 针对SM4密码算法的多点联合能量分析攻击[J]. 计算机研究与发展, 2016, 53(10): 2224-2229. Du Zhibo, Wu Zhen, Wang Min, et al.Multi-Point Joint Power Analysis Attack Against SM4[J]. Journal of Computer Research and Development, 2016, 53(10): 2224-2229. [2] Kocher P C.Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems[C]// LNCS 1109: Proc of the CRYPTO 1996. Berlin: Springer, 1996: 104-113. [3] Quisquater J J, David S.Encyclopedia of Cryptography and Security. Boston[M]. USA: Springer, 2005: 170-174. [4] Biryukov A, Dinu D, Großschädl J.Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice[C]// Applied Cryptography and Network Security. Cham: Springer, 2016. [5] 向春玲, 吴震, 饶金涛, 等. 针对一种AES掩码算法的频域相关性能量分析攻击[J]. 计算机工程, 2016, 42(10): 146-150. Xiang Chunling, Wu Zhen, Rao Jintao, et al.Correlation Power Analysis Attack in Frequency Domain for an AES Mask Algorithm[J]. Computer Engineer, 2016, 42(10): 146-150. [6] 唐明, 彭红波, 胡晓波, 等. 针对RSM轻量防护方法的能量分析[J]. 武汉大学学报(理学版), 2016, 62(3): 235-241. Tang Ming, Peng Hongbo, Hu Xiaobo, et al.Power Analysis against Lightweight Countmeasure RSM[J]. Journal of Wuhan University (Natural Science Edition), 2016, 62(3): 235-241. [7] 杜之波, 吴震, 王敏, 等. 基于SM3的动态令牌的能量分析攻击方法[J]. 通信学报, 2017, 38(3): 65-72. Du Zhibo, Wu Zhen, Wang Min, et al.Power Analysis Attack of Dynamic Password Token based on SM3[J]. Journal on Communications, 2017, 38(3): 65-72. [8] 王思翔, 张磊, 段晓毅, 等. 基于希尔伯特黄变换滤波预处理的相关性能量分析攻击[J]. 计算机工程, 2018, 44(7): 160-166, 171. Wang Sixiang, Zhang Lei, Duan Xiaoyi, et al.Correlation Power Analysis Attack Based on Hilbert-Huang Transform Filtering Pretreatment[J]. Computer Engineering, 2018, 44(7): 160-166, 171. [9] Zhao C, Li X Y, Jin J F, et al.Two-point Joint CPA Attacks against SM4 Algorithm[C]// 2019 IEEE 11th International Conference on Communication Software and Networks. Chongqing, China: IEEE, 2019. [10] Daemen J, Rijmen V.The Design of Rijndael: AES, the advanced Encryption Standard[M]. Verlag Berlin Heidelberg: Springer, 2002. [11] 王双. 面向侧信道攻击的相关密钥排序算法研究[D].南京: 南京航空航天大学, 2018. Wang Shuang.Dependent Key Ranking Algorithm for Side-Channel Attack[D]. Nanjing: Nanjing University of Aeronautics and Astronautics, 2018. |