1. Kim G, Shin D, Shin D. Mobile multimedia digital rights management (DRM) for hand-held devices. Proceedings of 23rd IEEE International Conference on Consumer Electronics, 2005 (ICCE’05), Jan 8-12, 2005, Las Vegas, NV, USA, Piscataway, NJ, USA: IEEE, 2005: 63-64
2. Data Encryption Standard (DES), FIPS PUB 46-3. [1999-10-25] http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
3. Schramm K, Wollinger T, Paar C. A new class of collision attacks and its application to DES. Proceedings of 10th International Workshop on Fast Software Encryption (FSE’03), Feb 24-26, 2003, Lund, Sweden. LNCS 2887, Berlin, Germany: Springer-Verlag, 2003: 206-222
4. Biham E, Shamir A. Differential fault analysis of secret key cryptosystems. Proceedings of the Conference on Advances in Cryptology(Crypto’97), Aug 17-21, 1997, Santa Barbara, CA, USA. LNCS 1294. Berlin, Germany: Springer-Verlag,1997: 513-525
5. Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Proceedings of the Conference on Advances in Cryptology (Crypto’96), Aug 18-22, 1996, Santa Barbara, CA, USA. LNCS 1294. Berlin, Germany: Springer-Verlag,1996: 104-113
6. Alejandro H, Marcos K. Strength of two data encryption standard implementations under timing attacks. ACM Transactions on Information and System Security, 1999, 2(4): 416-437
7. Tsunoo Y, Saito T, Suzaki T, et al. Cryptanalysis of DES implemented on computers with cache. Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES’03), Sep 7-10, 2003, Cologne, Germany. LNCS 2779. Berlin, Germany: Springer-Verlag, 2003: 62-76
8. Kocher P, Jaffe J, Jun B. Introduction to differential power analysis and related attacks. december 1998. http://www.cryptography.com/resources/ whitepapers/DPATechInfo.pdf |