[1] |
BOGDANOV A, KNUDSEN L R, LEANDER G, et al. PRESENT: An Ultra-lightweight Block Cipher[EB/OL]. http://link.springer.com/10.1007/978-3-540-74735-2_31, 2020-07-22.
|
[2] |
GUO J, PEYRIN T, POSCHMANN A, et al. The LED Block Cipher[EB/OL]. http://link.springer.com/10.1007/978-3-642-23951-9_22, 2020-07-22.
|
[3] |
WU Wenling, ZHANG Lei. LBlock: A Lightweight Block Cipher[EB/OL]. http://link.springer.com/10.1007/978-3-642-21554-4_19, 2020-09-25.
|
[4] |
SHIBUTANI K, ISOBE T, HIWATARI H, et al. Piccolo: An Ultra-Lightweight Blockcipher[EB/OL]. http://link.springer.com/10.1007/978-3-642-23951-9_23. 2011/June 22, 2021, 2020-12-06.
|
[5] |
KOCHER P C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems[EB/OL]. http://link.springer.com/10.1007/3-540-68697-5_9, 2020-12-06.
|
[6] |
LI Wei, WU Yixin, GU Dawu, et al. Analysis of Ciphertext-only Failure of LBlock Lightweight Cryptographic Algorithm[J]. Journal of Computer Research and Development, 2018, 55(10):2174-2184.
|
|
李玮, 吴益鑫, 谷大武, 等. LBlock轻量级密码算法的唯密文故障分析[J]. 计算机研究与发展, 2018, 55(10):2174-2184.
|
[7] |
WU Yixin. Research on Ciphertext Failure Analysis of Lightweight Block Cipher[D]. Shanghai: Donghua University, 2019.
|
|
吴益鑫. 轻量级分组密码的唯密文故障分析研究[D]. 上海:东华大学, 2019.
|
[8] |
KOCHER P, JAFFE J, JUN B. Differential Power Analysis[C]// Springer. International Cryptology Conference on Advances in Cryptology, October 17-19, 1999, Berlin. Berlin: Springer, 1999: 388-397.
|
[9] |
Zheng Shuyu. Research on DPA Attack and Protection of AES Encryption Algorithm Based on SOC Chip[D]. Shenyang: Liaoning University, 2020.
|
|
郑树宇. 基于SOC芯片的AES加密算法的DPA攻击与防护研究[D]. 沈阳:辽宁大学, 2020.
|
[10] |
NIKOVA S, RECHBERGER C, RIJMEN V. Threshold Implementations Against Side-channel Attacks and Glitches[EB/OL]. http://link.springer.com/10.1007/11935308_38, 2021-01-05.
|
[11] |
NIKOVA S, RIJMEN V, SCHLAFFER M. Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches[J]. Journal of Cryptology, 2011, 24(2):292-321.
doi: 10.1007/s00145-010-9085-7
URL
|
[12] |
AKKAR ML, GIRAUD C. An Implementation of DES and AES, Secure against Some Attacks[EB/OL]. http://link.springer.com/10.1007/3-540-44709-1_26, 2021-01-05.
|
[13] |
LIANG Hao, WU Liji, ZHANG Xiangmin, et al. Design of a Masked S-box for SM4 Based on Composite Field.[EB/OL]. https://ieeexplore.ieee.org/abstract/document/7016923, 2021-01-05
|
[14] |
UENO R, HOMMA N, AOKI T. A Systematic Design of Tamper-resistant Galois-field Arithmetic Circuits Based on Threshold Implementation with(d+1) Input Shares[EB/OL]. https://ieeexplore.ieee.org/abstract/document/7964980, 2021-01-05.
|
[15] |
ZHONG Weidong, MENG Qingquan, ZHANG Shuaiwei, et al. Implementation and Optimization of S-box Based on Secret Sharing AES[J]. Engineering Science and Technology, 2017, 49(1):191-196.
|
|
钟卫东, 孟庆全, 张帅伟, 等. 基于秘密共享的AES的S盒实现与优化[J]. 工程科学与技术, 2017, 49(1):191-196.
|
[16] |
BILGIN B, NIKOVA S, NIKOV V, et al. Threshold Implementations of Small S-boxes[J]. Cryptography and Communications, 2015, 7(1):3-33.
doi: 10.1007/s12095-014-0104-7
URL
|