共 27 条
[1]
KOCHER P C., Timing attacks on implementations of Dif⁃ fie-Hellman, RSA, DSS, and other systems, Advances in Cryptology — CRYPTO'96, pp. 104-113, (1996)
[2]
KOCHER P, JAFFE J, JUN B., Differential power analysis, Advances in Cryptology — CRYPTO'99, pp. 388-397, (1999)
[3]
BONEH D, DEMILLO R A, LIPTON R J., On the impor⁃ tance of checking cryptographic protocols for faults, Advances in Cryptology — EUROCRYPT'97, pp. 37-51, (1997)
[4]
OU Q Y, LUO F, WU X P, Et al., Research on the metric method for the security of the block cipher based on the voltage glitch fault disturbance, Acta Electronica Sinica, 49, 3, pp. 417-423, (2021)
[5]
AMIEL F, VILLEGAS K, FEIX B, Et al., Passive and ac⁃ tive combined attacks: Combining fault attacks and side channel analysis, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp. 92-102, (2007)
[6]
Information Security Technology—Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves: Part 1 General: GB/T 32918.1—2016, (2017)
[7]
WANG Z H, ZHANG Z F., Overview on public key crypto⁃ graphic algorithm SM2 based on elliptic curves, Journal of Information Security Research, 2, 11, pp. 972-982, (2016)
[8]
SHI R H, LI Z J, DU L, Et al., Side channel analysis on SM2 decryption algorithm, Journal of Cryptologic Re⁃ search, 2, 5, pp. 467-476, (2015)
[9]
DHEM J F, KOEUNE F, LEROUX P A, Et al., A practical implementation of the timing attack, Lecture Notes in Computer Science, pp. 167-182, (2000)
[10]
BRUMLEY B B, TUVERI N., Remote timing attacks are still practical, European Symposium on Research in Computer Security, pp. 355-371, (2011)