共 38 条
[1]
Mangard S., Oswald E., Popp T., Power analysis attacks: revealing the secrets of smart cards, 31, (2008)
[2]
Kocher P., Jaffe J., Jun B., Differential power analysis, Proceedings of the Advances in Cryptology, pp. 388-397, (1999)
[3]
Anderson R., Kuhn M.G., Tamper resistance-a cautionary note, Proceedings of the Second USENIX Workshop on Electronic Commerce, pp. 18-21, (1996)
[4]
Kommerling O., Kuhn M.G., Design principles for tamper-resistant smart card processors, Proceedings of the USENIX Workshop on Smart card Technology, pp. 10-11, (1999)
[5]
Gammel B.M., Ruping J., Smart cards inside, Proceedings of the 31st European Solid-State Circuits Conference, pp. 69-74, (2005)
[6]
Suman S., Sharma K.G., Ghosh P.K., Performance analysis of voltage-controlled ring oscillators, Proceedings of the International Congress on Information and Communication Technology, pp. 29-38, (2016)
[7]
Rivest R.L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems, Commun ACM, 21, 2, pp. 120-126, (1978)
[8]
Biham E., Shamir A., Differential fault analysis of secret key cryptosystems, Proceedings of the Annual International Cryptology Conference, pp. 513-525, (1997)
[9]
Bao F., Deng R.H., Han Y., Et al., Breaking public key cryptosystems in the presence of transient faults, Proceedings of the International Workshop on Security Protocols, pp. 115-124, (1997)
[10]
Choi Y., Choi D., Lee H., Et al., An improved square-always exponentiation resistant to side-channel attacks on RSA implementation, Intell Autom Soft Comput, 22, 3, pp. 353-363, (2016)