共 13 条
[1]
SAKURA Hardware Security Project. http://satoh.cs.uec.ac.jp/SAKURA/hardware/SAKURA-G.html . 2014
[2]
Differential Power Analysis of HMAC Based on SHA-2,and Countermeasures. KIM S,YUNG M,LEE H,et al. Information Security Applications . 2007
[3]
Handbook of Applied Cryptography. Menezes A,van Oorschot P,Vanstone S. Journal of Women s Health . 1996
[4]
Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3. PROUFF E,BETTALE L,DOTTAX E,et al. Constructive Side-Channel Analysis and Secure Design . 2014
[5]
Improved collision-correlation power analysis on first order protected AES. Clavier C,Feix B,Gagnerot G,et al. Cryptographic Hardware and Embedded Systems-CHES 2011 . 2011
[6]
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Xiaoyun Wang,Dengguo Feng,Xuejia Lai,et al. Rump Session of Crypto’04 E-print . 2004
[7]
Techniques for random masking in hardware. Golic,Jovan Dj. IEEE Transactions on Circuits and Systems I: Regular Papers . 2007
[8]
Correlation power analysis with a leakage model. Eric Brier,Christophe Clavier,Francis Olivier. Cryptographic Hardware and Embedded Systems CHES2004 . 2004
[9]
On Boolean and arithmetic masking against differential power analysis. Coron J S,Goubin L. Cryptographic Hardware and Embedded Systems-CHES 2000 . 2000
[10]
Efficient and provably secure methods for switching from arithmetic to boolean masking. Debraize B. Cryptographic Hardware and Embedded Systems-CHES 2012 . 2012