共 25 条
- [1] KOCHER P C., Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology-CRYPTO'96, pp. 104-113, (1996)
- [2] MESSERGES T S., Using second-order power analysis to attack DPA resistant software, Cryptographic Hardware and Embedded Systems-CHES 2000, pp. 238-251, (2000)
- [3] FERRIGNO J, HLAVAC M., When AES blinks: introducing optical side channel, IET Information Security, 2, 3, pp. 94-98, (2008)
- [4] GENKIN D, SHAMIR A, TROMER E., RSA key extraction via low-bandwidth acoustic cryptanalysis, Advances in Cryptology-CRYPTO 2014, pp. 444-461, (2014)
- [5] BONEH D, DEMILLO R A, LIPTON R J., On the importance of checking cryptographic protocols for faults, Advances in Cryptology-EUROCRYPT'97, pp. 37-51, (1997)
- [6] KOCHER P, JAFFE J, JUN B., Differential power analysis, Advances in Cryptology-CRYPTO'99, pp. 388-397, (1999)
- [7] NIKOVA S, RECHBERGER C, RIJMEN V., Threshold implementations against side-channel attacks and glitches, Information and Communications Security, pp. 529-545, (2006)
- [8] PIRET G, QUISQUATER J J., A differential fault attack technique against SPN structures, with application to the AES and KHAZAD, Cryptographic Hardware and Embedded Systems-CHES 2003, pp. 77-88, (2003)
- [9] FENG J Y, CHEN H, LI Y, Et al., A framework for evaluation and analysis on infection countermeasures against fault attacks, IEEE Transactions on Information Forensics and Security, 15, pp. 391-406, (2020)
- [10] ISHAI Y, PRABHAKARAN M, SAHAI A, Et al., Private circuits II: keeping secrets in tamperable circuits, Advances in Cryptology-EUROCRYPT 2006, pp. 308-327, (2006)