[1] KOCHER P C, JAFFE J, JUN B. Differential power analysis [C]//CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1666. Berlin: Springer, 1999: 388-397. [2] QUISQUATER J-J, SAMYDE D. ElectroMagnetic Analysis (EMA): measures and countermeasures for smart cards [C]//E-smart 2001: Proceedings of the 2001 International Conference on Research in Smart Cards: Smart Card Programming and Security, LNCS 2140. Berlin: Springer, 2001: 200-210. [3] KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems [C]//CRYPTO 1996: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1109. Berlin: Springer, 1996: 104-113. [4] ANDERSON R, KUHN M. Tamper resistance: a cautionary note [C]//Proceedings of the Second USENIX Workshop on Electronic Commerce. Berkeley: USENIX Association, 1996: 1-11. [5] ANDERSON R, KUHN M. Low cost attacks on tamper resistant devices [C]//Proceedings of the Fifth International Security Protocol Workshop, LNCS 1361. Berlin: Springer, 1997: 125-136. [6] OSWALD D, PAAR C. Breaking mifare DESFire MF3ICD40: power analysis and templates in the real world [C]//CHES 2011: Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 6917. Berlin: Springer, 2011: 207-222. [7] EISENBARTH T, KASPER T, MORADI A, et al. On the power of power analysis in the real world: a complete break of the KeeLoq code hopping scheme [C]//CRYPTO 2008: Proceedings of the 28th Annual International Cryptology Conference on Advances in Cryptology, LNCS 5157. Berlin: Springer, 2008: 203-220. [8] ZHOU Y, YU Y, STANDAERT F-X, et al. On the need of physical security for small embedded devices: a case study with COMP128-1 implementations in SIM cards [C]//FC 2013: Proceedings of the 17th International Conference on Financial Cryptography and Data Security, LNCS 7859. Berlin: Springer, 2013: 230-238. [9] Office of State Commercial Cipher Administration. SMS4 cipher for WLAN products [EB/OL]. (2013-01-20) [2015-02-20]. http://www.oscca.gov.cn/Up-File/200621016423197990.pdf/. (国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法 [EB/OL]. (2013-01-20) [2015-02-20]. http://www.oscca.gov.cn/Up-File/200621016423197990.pdf/.) [10] People's Bank of China, Technology Department. China Financial Integrated Circuit (IC) Card Specifications (PBOC 3.0) [EB/OL]. (2013-02-03) [2015-02-03]. http://www.cspress.cn/u/cms/www/201305/08135924px0o.pdf/. (中国人民银行技术部.中国金融集成电路卡规范 [EB/OL]. (2013-02-03) [2015-02-03]. http://www.cspress.cn/u/cms/www/201305/08135924px0o.pdf/.) [11] BAI X, GUO L, LI T. Differential power analysis attack on SMS4 block cipher [C]//ICCSC 2008: Proceedings of the 4th IEEE International Conference on Circuits and Systems for Communications. Piscataway: IEEE, 2008:613-617. [12] XU Y, BAI X, GUO L. An efficient implementation of SMS4 cipher with multiplicative masking resistant to differential power analysis attack [C]//CMC '09: Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing. Washington, DC: IEEE Computer Society, 2009, 3: 364-369. [13] NGUYEN P H, REBEIRO C, MUKHOPADHYAY D, et al. Improved differential cache attacks on SMS4 [C]//IWSEC 2012: Proceedings of the 8th International Conference on Information Security and Cryptology, LNCS 7763. Berlin: Springer, 2012: 29-45. [14] ZHANG L, WU W. Differential fault analysis on SMS4 [J]. Chinese Journal of Computers, 2006, 29(9): 1596-1602. (张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602.) [15] LI R, SUN B, LI C, et al. Differential fault analysis on SMS4 using a single fault [J]. Information Processing Letters, 2011, 111(4): 156-163. [16] LI W, GU D. Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule [J]. Journal on Communications, 2008, 29(10): 135-142. (李玮,谷大武.基于密钥编排故障的SMS4算法的差分故障分析[J]. 通信学报,2008,29(10):135-142.) [17] LIU H, WANG T, ZHAO X, et al. Algebraic side-channel attack on SMS4 key schedule [C]//IMCCC 2011: Proceedings of the First International Conference on Instrumentation Measurement, Computer, Communication and Control, LNCS 143. Berlin: Springer, 2011: 553-556. [18] BRIER E, CLAVIER C, OLIVIER F. Correlation power analysis with a leakage model [C]//CHES 2004: Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 3156. Berlin: Springer, 2004: 16-29. [19] KASPER T, OSWALD O, PAAR C. Side-channel analysis of cryptographic RFIDs with analog demodulation [C]//RFIDSec 2011: Proceedings of the 7th International Workshop on RFID. Security and Privacy, LNCS 7055. Berlin: Springer, 2012: 61-77. [20] ISO. Identification cards Integrated circuit cards-part 3: cards with contacts electrical interface and transmission protocols, ISO/IEC 7816-3 [S]. [S.l.]: ISO, 1992. [21] CLAVIER C, CORON J-S, DABBOUS N. Differential power analysis in the presence of hardware countermeasures [C]//CHES 2000: Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 1965. Berlin: Springer, 2000: 252-263. [22] MANGARD S, OSWALD E, POPP T. Power analysis attacks: revealing the secrets of smart cards [M]. Berlin: Springer, 2007:1-281. [23] GOUBIN L, PATARIN J. DES and differential power analysis (the duplication method) [C]//CHES 1999: Proceedings of the First Workshop on Cryptographic Hardware and Embedded Systems, LNCS 1717. Berlin: Springer, 1999: 158-172. [24] MCEVOY R, TUNSTALL M, WHELAN C, et al. All-or-nothing transforms as a countermeasure to differential side-channel analysis [J]. International Journal of Information Security, 2014, 13(3): 291-304. [25] STANDAERT F-X, ARCHAMBEAU A C, FOR C. Using subspace-based template attacks to compare and combine power and electromagnetic information leakages [C]//CHES 2008: Proceedings of the 2008 Workshop on Cryptographic Hardware and Embedded Systems, LNCS 5154. Berlin: Springer, 2008: 411-425. [26] CHARI S, RAO J R, ROHATGI P. Template attacks [C]//CHES 2002: Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 2523. Berlin: Springer, 2002: 13-28. |