2. Standaert F X, Malkin T G, Yung M. A unified framework for the analysis of side-channel key recovery attacks. Proceedings of the 28th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’09), Apr 26-30, 2009, Cologne, Germany. LNCS 5479. Berlin, Germany: Springer-Verlag, 2009: 443-461
3. Kocher P C, Jaffe J, Jun B. Differential power analysis. Proceedings of the 19th Annual International Cryptology Conference (CRYPT’99), Aug 15-19, 1999, Santa Barbara, CA, USA. LNCS 1666. Berlin, Germany: Springer-Verlag, 1999: 388-397
4. Lano J, Mentens N, Preneel, et al. Power analysis of synchronous stream ciphers with resynchronization mechanism. Proceedings of the Ecrypt Conference on the State of the Art of Stream Ciphers (SASC’04), Oct 13-15, 2004, Brugge, Belgium. Berlin, Germany: Springer-Verlag, 2004: 327-333
5. Fischer W, Gammel B M, Kuiffler O, et al. Differential power analysis of stream ciphers. Proceedings of the Cryptographers’ Track at the RSA Conference (CT-RSA’07), Feb 5-9, 2007, San Francisco, CA. USA. LNCS 4377. Berlin, Germany: Springer-Verlag, 2007: 257-270
6. Burman S, Mukhopadhyay D, Veezhmathan K. LFSR based stream ciphers are vulnerable to power attacks. Proceedings of the 8th International Conference on Cryptology in India (INDOCRYPT’07), Dec 9-13, 2007, Chennai, India. LNCS 4859. Berlin, Germany: Springer-Verlag, 2007: 384-392
7. Coron J C, Kocher P, Naccache D. Statistics and secret leakage. Proceedings of the 4th International Conference on Financial Cryptography (FC’00), Feb 20-24, 2000, Anguilla, British West Indies. LNCS 1962. Berlin, Germany: Springer-Verlag, 2000: 157-173
8. Mayer-Sommer R. Smartly analyzing the simplicity and the power of simple power analysis on smartcards. Proceedings of the 2nd International Workshop Cryptographic Hardware and Embedded Systems (CHES’00), Aug 17-18, 2000, Worcester, MA, USA. LNCS 1965. Berlin, Germany: Springer-Verlag, 2000: 78-92
9. Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. Proceedings of the 6th International Workshop Cryptographic Hardware and Embedded Systems (CHES’04), Aug 11-13, 2004, Cambridge, MA, USA. LNCS 3156. Berlin, Germany: Springer-Verlag, 2004: 16-29
10. Moradi A, Mischke O, Eisenbarth T. Correlation-enhanced power analysis collision attack. Proceedings of the 12th International Workshop Cryptographic Hardware and Embedded Systems (CHES’10), Aug 17-20, 2010, Santa Barbara, CA, USA. LNCS 6225. Berlin, Germany: Springer-Verlag, 2010: 125-139
11. Mangard S, Oswald E, Popp T. Power analysis attacks: revealing the secrets of smart cards. New York, NY, USA: Springer, 2007
12. Kumar S, Lemke K, Paar C, et al. Some thoughts about implementation properties of stream ciphers. Proceedings of the Ecrypt Conference on the State of the Art of Stream Ciphers (SASC’04), Oct 13-15, 2004, Brugge, Belgium. Berlin, Germany: Springer-Verlag, 2004: 311-319
13. Zhang Y L, Han W B. Differential power attack on linear feedback shift register. Journal of Electronics and Information Technology. 2009, 31(10): 2406-2410 (in Chinese)
|