共 33 条
[1]
Bruneau Nicolas, Guilley Sylvain, Heuser Annelie, Marion Damien, Rioul Olivier, Less is more, Cryptographic Hardware and Embedded Systems – CHES 2015, pp. 22-41, (2015)
[2]
BSI-Technische Richtlinie. Kryptographische Verfahren: Empfehlungen und Schlüssellängen, (2019)
[3]
Choudary Omar, Kuhn Markus G, Efficient template attacks, International Conference on Smart Card Research and Advanced Applications, pp. 253-270, (2013)
[4]
Diffie Whitfield, Hellman Martin E., Special feature exhaustive crypt-analysis of the NBS data encryption standard, IEEE Computer, 10, 6, pp. 74-84, (1977)
[5]
Durvaux Francois, Standaert Francois-Xavier, From improved leakage detection to the detection of points of interests in leakage traces, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 240-262, (2016)
[6]
Goodwill Benjamin Jun Gilbert, Jaffe Josh, Rohatgi Pankaj, Et al., A testing methodology for side-channel resistance validation, NIST non-invasive attack testing workshop, (2011)
[7]
Glowacz Cezary, Grosso Vincent, Poussier Romain, Schuth Joachim, Standaert Francois-Xavier, Simpler and more efficient rank estimation for side-channel security assessment, Fast Software Encryption, pp. 117-129, (2015)
[8]
Grosso Vincent, Standaert Francois-Xavier, ASCA, SASCA and DPA with enumeration: Which one beats the other and when?, International Conference on the Theory and Application of Cryptology and Information Security, pp. 291-312, (2014)
[9]
Heyszl Johann, Merli Dominik, Heinz Benedikt, De Santis Fabrizio, Sigl Georg, Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis, Smart Card Research and Advanced Applications, Lecture Notes in Computer Science, (2012)
[10]
Hu Yongbo, Zhang Chen, Zheng Yeyang, Wagner Mathias, Ciphertext and plaintext leakage reveals the entire TDES key, Cryptology ePrint Archive, (2016)