[1] |
KOCHER P, JAFFE J, JUN B.Differential Power Analysis[C]// Springer.International Cryptology Conference on Advances in Cryptology, August 15-19, 1999,California.Berlin:Springer International Publishing, 1999:388-397.
|
[2] |
NIKOVA S, RECHBERGER C, RIJIMEN V.Threshold Implementations against Side-channel Attacks and Glitches[C]// Springer.International Conference on Information and Communications Security, December 4-7, 2006, North Carolina.Berlin:Springer International Publishing, 2006:529-545.
|
[3] |
MORADI A, POSCHMANN A, LING S, et al.Pushing the Limits: a Very Compact and a Threshold Implementation of AES[C]// Springer. Annual International Conference on the Theory and Applications,May 15-19, 2011,Tallinn.Berlin:Springer International Publishing, 2011: 69-88.
|
[4] |
BILGIN B, GIERLICHS B,NIKOVA S, et al.A More Efficient AES Threshold Implementation[C]// Springer .International Conference on Cryptology in Africa,May 28-30, 2014, Morocco.Berlin:Springer International Publishing, 2014: 267-284.
|
[5] |
BOSS E, GROSSO V, GUNEYSU T, et al.Strong 8-bit S boxes with Efficient Masking in Hardware[C]// Springer. Cryptographic Hardware and Embedded Systems-CHES 2016: 18th International Conference, August 17-19, 2016,Santa Barbara, CA, USA.Berlin:Springer International Publishing, 2016:171-193.
|
[6] |
BATINA L, JAKOBOVIC D,MENTENS N, et al.S-box Pipelining Using Genetic Algorithms for High-throughput AES Implementations: How Fast can We Go?[C]// Springer.International Conference in Cryptology, August 17-21, 2014, India.Berlin:Springer International Publishing, 2014: 322-337.
|
[7] |
方跃坚,朱锦钟,周文,等. 数据挖掘隐私保护算法研究综述[J].信息网络安全,2017(2):6-11.
|
[8] |
HEYS H M, Tavares S E.The Design of Substitution-permutation Networks Resistant to Differential and Linear Cryptanalysis[J]. ACM Conference on Computer & Communications Security, 1994 , 9(1) :148-155.
|
[9] |
BILGIN B, NIKOVA S, NIKOV V, et al.Threshold Implementations of Small S-boxes[J].Cryptography &Communications,2015, 7(1):3-33.
|
[10] |
钟卫东, 孟庆全, 张帅伟,等. 基于秘密共享的AES的S盒实现与优化[J]. 四川大学学报(工程科学版), 2017, 49(1):191-196.
|
[11] |
SASDRICH P, MORADI A, GUNEYSU T.Affine Equivalence and its Application to Tightening Threshold Implementations[C]// Springer. International Conference on Selected Areas in Cryptography,August 12-14, 2015, New Brunswick.Berlin:Springer International Publishing, 2015: 263-276.
|
[12] |
CNUDDE T D, REPARAZ O, BILGIN B, et al.Masking AES with d+ 1 Shares in Hardware[C]// Springer. International Conference on Cryptographic Hardware and Embedded Systems, September 13-16, 2015,California.Berlin:Springer International Publishing, 2016: 194-212.
|
[13] |
KUTZNER S, NGUYEN P H, POSCHMANN A.Enabling 3-share Threshold Implementations for all 4-bit s-boxes[C]// Springer. International Conference on Information Security and Cryptology,November 27-29, 2013,Seoul.Berlin:Springer International Publishing, 2013: 91-108.
|
[14] |
BILGIN B,NIKOVA S, NIKOV V, et al.Threshold Implementations of all 3×3 and 4×4 S-boxes[C]// Springer.International Workshop on Cryptographic Hardware and Embedded Systems,September 9-12, 2012,Leuven.Berlin:Springer International Publishing, 2012: 76-91.
|
[15] |
AUMASSON JP.Analysis and Design of Symmetric Cryptographic Algorithms[EB/OL]. ,2017-6-15.
|
[16] |
BILGIN B, NIKOVA S, NIKOV V, et al.Threshold Implementations of Small S-boxes[J]. Cryptography and communications, 2015, 7(1): 3-33.
|
[17] |
程资,靳俐荣,石金晶. 基于RS码生成机制的(k,n)门限量子秘密共享方案[J].信息网络安全,2016(4):44-49.
|
[18] |
BUDAGHYAN L, HELLSESTH T, KHOLOSHA A.Editorial: Special Issue on Boolean Functions and Their Applications[J]. Cryptography and Communications, 2016, 8(2): 173-174.
|
[19] |
王硕,程相国,陈亚萌,等. 密钥隔离的群签名方案研究[J].信息网络安全,2017(4):40-45.
|