共 24 条
- [1] Kocher P C., Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Proceedings of the 16th Annual International Cryptology Conference, pp. 104-113, (1996)
- [2] Messerges T S., Using second-order power analysis to attack DPA resistant software, Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, pp. 238-251, (2000)
- [3] Ferrigno J, Hlavac M., When AES blinks: introducing optical side channel, IET Information Security, 2, 3, pp. 94-98, (2008)
- [4] Boneh D, DeMillo R A, Lipton R J., On the importance of checking cryptographic protocols for faults, Proceedings of International Conference on Theory and Application of Cryptographic, pp. 37-51, (1997)
- [5] Gornik A, Stoychev I, Oehm Jiirgen, A novel circuit design methodology to reduce side channel leakage, Proceedings of International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 1-15, (2012)
- [6] Tiri K, Akmal M, Verbauwhede I., A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards, Proceed-ings of the 28th European Solid-State Circuits Conference, pp. 403-406, (2002)
- [7] Tiri K, Verbauwhede I., A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation, Pro-ceedings of the Design, Automation and Test in Europe Conference and Exhibition, pp. 246-251, (2004)
- [8] Suzuki D, Saeki M., Security evaluation of DPA countermeas-ures using dual-rail pre-charge logic style, Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, pp. 255-269, (2006)
- [9] Tiri K, Hwang D, Hodjat A, Et al., Prototype IC with WDDL and differential routing-DPA resistance assessment, Proceed-ings of International Workshop on Cryptographic Hardware and Embedded Systems, pp. 354-365, (2005)
- [10] Chari S, Jutla C S, Rao J R, Et al., Towards sound approaches to counteract power-analysis attacks, Proceedings of the 19th Annual International Cryptology Conference, pp. 398-412, (1999)