XU Kaiyong FANG Ming YANG Tianchi MENG Fanwei HUANG Huixin. Value-at-risk quantitative method about password chip under differential power analysis attacks[J]. Journal of Computer Applications, 2013, 33(06): 1642-1645.
[1]AGRAWAL D, RAO J R, ROHATGI P, et al.Templates as master keys[J].Cryptographic Hardware and Embedded System,2005,38(12):53-56[2] 姚剑波, 张涛.层次化的侧信道攻击风险量化评估模型[J].计算机工程与应用,2012,48(26):84-87.[3] 姚剑波,张涛.基于互信息博弈的侧信道攻击安全风险评估[J].计算机科学,2012,39(6):69-71.[4] JOYE M, PAILLIER P, SCHOENMAKERS B. On second-order differential power analysis [C]// Proceedings of Cryptograph IC Hardware and Embedded Systems. Berlin: Springer-Verlag, 2005:293-308. [5] 童元满.基于细粒度任务调度的防功耗分析模幂方法[J].计算机工程,2006,32(24):15-16,33.[6] 李志强,严迎建,段二朋.差分能量攻击样本选取方法[J].计算机应用,2012,32(1):92-94.[7] 郑媛媛,王韬,赵新杰,等.针对AES第一轮的汉明重代数攻击研究[J].微电子学与计算机,2011,28(7):83-85.[8] 李雄伟,邹程,陈开颜,等.针对FPGA密码芯片M-DPA攻击的研究与实现[J].计算机测量与控制,2011,19(12):3121-3124.[9] 欧海文,李起瑞,胡晓波,等.智能卡芯片中TDES密码电路的差分功耗攻击[J].计算机应用研究,2012,29(3):927-929.[10] 童元满.基于动态双轨逻辑的抗功耗攻击安全芯片半定制设计流程[J].小型微型计算机系统,2007,28(5):935-939.[11] 张玉敏.基于不同核函数的概率密度函数估计比较研究[D].保定:河北大学,2010.[12] HARDLE W. Smoothing Techniques: With implementation in S (Springer Series in Statistics)[M].Berlin: Springer-Verlag, 2008:296-306.[13] PARZEN E. On estimation of a probability density function and mode[J].The Annals of Mathematical Statistics,1962,33(3): 1065-1076.