[1] |
KOCHER P, JAFFE J, JUN B.Differential Power Analysis[C]//International Association for Cryptologic Research (IACR). Advances in Cryptology-CRYPTO'99, August 15-19, 1999, Santa Barbara, California, USA. Heidelberg: Springer, 1999: 388-397.
|
[2] |
MESSERGES T S, DABBISH E A, SLOAN R H. Investigations of Power Analysis Attacks on Smartcards[EB/OL]., 1999-5-10.
|
[3] |
CORON J S.Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems[C]//IACR. First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999. Heidelberg: Springer, 1999: 292-302.
|
[4] |
TIRI K, HWANG D, HODJAT A, et al.A Side-channel Leakage Free Coprocessor IC in 0.18um CMOS for Embedded AES-based Cryptographic and biometric processing[C]//ACM, EDAC, IEEE. The 42nd Design Automation Conference, June 13-17, 2005, Anaheim, CA. New York: ACM, 2005: 222-227.
|
[5] |
TIRI K, HWANG D, HODJAT A, et al.Prototype IC with WDDL and Differential Routing-DPA Resistance Assessment[C]//The International Association for Cryptologic Research (IACR). Cryptographic Hardware and Embedded Systems-CHES 2005, August 29-September 1, 2005, Edinburgh, UK. Heidelberg: Springer, 2005: 354-365.
|
[6] |
TIRI K, VERBAUWHEDE I.A Logic Level Design Methodology for A Secure DPA Resistant ASIC or FPGA Implementation[C]//EDAA, the EDA Consortium, IEEE, ea al. Conference on Design, Automation and Test in Europe, 2004, February 16-20, 2004, Paris, France. New Jersey: IEEE, 2004: 246-251.
|
[7] |
TIRI K, VERBAUWHEDE I.A Digital Design Flow for Secure Integrated Circuits[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2006, 25(7): 1197-1208.
|
[8] |
WANG Yi, DOUGLAS L M.A Robust Algorithm for DPA-resistant ECC[C]//IEEE. Nanyang Technological University. 12th International Symposium on Integrated Circuits, ISIC 2009, December 14-16, 2009, Singapore. New Jersey: IEEE, 2009: 667-670.
|
[9] |
TANIMURA K, DUTT N.ExCCel: Exploration of Complementary Cells for Efficient DPA Attack Resistivity[C]//IEEE. 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), June 13-14, Anaheim, CA. New Jersey: IEEE, 2010: 52-55.
|
[10] |
KADOWAKI T, NISHIMORI H.Quantum Annealing in the Transverse Ising Model[J]. Physical Review E Statistical Physics Plasmas Fluids & Related Interdisciplinary Topics, 1998, 58(5): 5355.
|
[11] |
仇各各,汪学明,张言胜. 基于HECC的WSN身份认证协议研究[J]. 信息网络安全,2015(12):54-58.
|
[12] |
MARTONÁK R, SANTORO G E, TOSATTI E. Quantum annealing of the Traveling Salesman Problem[J]. Physical Review E Statistical Nonlinear & Soft Matter Physics, 2004, 70(5): 1-5.
|
[13] |
ARNAB D, CHAKRABARTI B K, STINCHCOMBE R B.Quantum Annealing in a Kinetically Constrained System[J]. Physical Review E, 2005, 72(72): 254-271.
|
[14] |
甲骨文国际公司. 在线数据加密和解密[EB/OL]. .
|
[15] |
MANGARD S, OSWALD E, POPP T.Power Analysis Attacks: Revealing the Secrets of Smart Cards[M]. Heidelberg: Springer, 2007.
|
[16] |
Daniel J M.A Balanced-power Domino-style Standard Cell Library for Fine-grain Asynchronous Pipelined Design to Resist Differential Power Analysis Attacks[D]. Boston: Boston University, 2005.
|
[17] |
KOCHER P, JAFFE J, JUN B, et al.Introduction to Differential Power Analysis and Related Attacks[J]. Journal of Cryptographic Engineering, 2011, 1(1): 5-27.
|
[18] |
ISBN/9787030172761--2006 国际标准书号[S]. 北京:科学出版社,2006.
|
[19] |
侯玉灵,卞阳东,胡广跃,等. 星际骨干网的轻量级密码体制研究[J]. 信息网络安全,2015(2):33-39.
|