[1]KOCHER P C, JAFFE J, JUN B. Differential power analysis [C]// CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 1999: 388-397.
[2]KUMAR S, LEMKE K, PAAR C. Some thoughts about implementation properties of stream ciphers [EB/OL]. [2013-08-04].http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.94.8994&rep=rep1&type=pdf.
[3]ZHAO Y, HU Y, JIA Y. New design of LFSR based stream ciphers to resist power attack [J]. Journal of Xidian University: Natural Science, 2013,40(3):172-200.(赵永斌,胡予濮,贾艳艳.一种抵抗能量攻击的线性反馈移位寄存器[J].西安电子科技大学学报:自然科学版,2013,40(3):172-200.)
[4]ZANG Y, HAN W. Differential power attack on linear feedback shift register [J]. Journal of Electronics and Information Technology, 2009,31(1[5]KHAZAEI S, HASANZADEH M M, KIAEI M S. Linear sequential circuit approximation of grain and trivium stream ciphers [EB/OL]. [2013-08-12]. http://eprint.iacr.org/2006/141.pdf.
[6]FISCHER W, GAMMEL B M, KNIFFLER O, et al. Differential power analysis of stream ciphers [C]// Proceedings of the 2007 Cryptographers' Track at the RSA Conference. Berlin: Springer-Verlag, 2007,4377: 257-270.
[7]YUSEOP L, KITAE J, JAECHUL S, et al. Related-key chosen IV attacks on Grain-v1 and Grain-128 [C]// Proceedings of the 13th 2008 Australasian Conference. Berlin: Springer-Verlag, 2008,5107:321–335.
[8]DINUR I, SHAMIR A. Breaking Grain-128 with dynamic cube attacks [C]// Proceedings of the 18th International Workshop on Fast Software Encryption. Berlin: Springer-Verlag, 2011:167–187.
[9]SONG H, FAN X, WU C, et al. Cube attack on Grain [J]. Journal of Software, 2012,23(1):171-176.(宋海欣,范修斌,武传坤,等.流密码算法Grain的立方攻击[J].软件学报,2012,23(1):171-176.)
[10]BERZATI A, CANOVAS C, CASTAGNOS G, et al. Fault analysis of Grain-128 [C]// Proceedings of the 2009 IEEE International Workshop on Hardware-oriented Security and Trust. Piscataway: IEEE Press, 2009:7–14.
[11]KARMAKAR S, CHOWDHURY D R. Fault analysis of Grain-128 by targeting NFSR [C]// AFRICACRYPT '11: Proceedings of the 4th International Conference on Progress in Cryptology in Africa. Berlin: Springer-Verlag, 2011:298-315.
[12]LANO J, MENTENS N, PRENEEL B, et al. Power analysis of synchronous stream ciphers with resynchronization mechanism [EB/OL]. [2013-08-17]. http://www.cosic.esat.kuleuven.be/publications/article-498.pdf.
[13]MANGARD S, OSWALD E, POPP T. Power analysis attacks [C]// FENG D, ZHOU Y,LIU J, et al. translation.
Beijing: Science Press, 2010:97-101.(MANGARD S, OSWALD E, POPP T.能量分析攻击[M]. 冯登国,周永彬,刘继业,等译.北京:科学出版社,2010: 97-101.)
[14]LI L, LI R, TONG Y, et al. Development on power analysis attack and defense of embedded cipher chip [J]. Journal of Computer Research and Development, 2010,47(4): 595-604.(李浪,李仁发,童元满,等.嵌入式加密芯片功耗分析攻击与防御研究进展[J].计算机研究与发展,2010,47(4):595-604.)
[15]LIU H, ZHAO X, WANG T, et al. Research on Hamming weight-based algebraic side-channel attacks on SMS4 [J]. Chinese Journal of Computers, 2013,36(6):1183-1193.(刘会英, 赵新杰, 王韬, 等. 基于汉明重的SMS4密码代数旁路攻击研究[J]. 计算机学报, 2013,36(6):1183-1193.) |