[1] |
KOBLITZ N.Elliptic Curve Cryptosystems[J]. Mathematics of Computing American Mathematical Society, 1987(48): 203-309.
|
[2] |
MILLER V S.Use of Elliptic Curves in Cryptography[C]//International Association for Cryptologic Research (IACR). Advances in Cryptology-CRYPTO’85, August 18-22, 1985, Santa Barbara, California, USA. Berlin: Springer, 1986: 417-426.
|
[3] |
侯玉灵,卞阳东,胡广跃,等. 星际骨干网的轻量级密码体制研究[J]. 信息网络安全,2015(2):33-39.
|
[4] |
QUISQUATER J J, SAMYDE D. ElectromagneticAnalysis (EMA): Measures and Counter Measures for Smart Cards[C]//The Java Card Forum, Eurosmart and INRIA. Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, September 19-21, 2001, Cannes, France. Berlin: Springer, 2001: 200-210.
|
[5] |
王敏,饶金涛,吴震,等. SM4密码算法的频域能量分析攻击[J]. 信息网络安全,2015(8):14-19.
|
[6] |
PADE D. Theoretical Use of Cache Memory as a Cryptanalytic Side-channel[R]. Bristol: Department of Computer Science, University of Bristol, Technical Report CSTR-02-003, 2002.
|
[7] |
赵新杰,郭世泽,王韬. 针对AES和CLEFIA的改进Cache踪迹驱动攻击[J]. 通信学报,2011,32(8):101-110.
|
[8] |
陈福臻,程久军,廖竞学,等. 基于网络编码的同态HASH抗污染攻击系统研究[J]. 信息网络安全,2015(6):33-40.
|
[9] |
张金中,寇应展,王韬. 针对滑动窗口算法的椭圆曲线密码故障分析[J]. 通信学报,2012,33(1):71-78.
|
[10] |
YANG Bo, WU Kaijie, KARRI R.Scan-based Side-Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard[C]//IEEE. International Test Conference, October 26-28, 2004, Charlotte, NC, USA. New Jersey: IEEE, 2004: 339-344.
|
[11] |
NARA R, TOGAWA N, YANAGISAWA M, et al.Scan-based Attack for an AES-LSI Included with Other IPs[J]. Ieice Technical Report Dependable Computing, 2008, 108(298): 49-53.
|
[12] |
NARA R, TOGAWA N, YANAGISAWA M, et al.Scan-Based Attack Against Elliptic Curve Cryptosystems[C]//IEEE. The 2010 15th Asia and South Pacific Design Automation Conference, January 18-21, 2010, Taipei. New Jersey: IEEE, 2010: 407-412.
|
[13] |
DEUTSCH D.Quantum Theory: the Church-Turing Principle and Universal Quantum Computer[J]. Proceedings of the Royal Society A Mathematical Physical & Engineering Sciences, 1985, 400(1818): 97-117.
|
[14] |
GROVER L K.A Fast Quantum Mechanics Algorithm for Database Search[C]//Association for Computing Machinery (ACM). The 28th ACM Symposium on Theory of Computation. 1996, Philadelphia, PA, USA. New York: ACM Press, 1996: 212-219.
|
[15] |
钟普查,鲍皖苏. 三重DES的量子中间相遇搜索算法[J]. 科学通报,2009,54(19):3003-3007.
|
[16] |
叶峰,袁家斌. AES加密算法的密钥搜索量子线路的设计[J]. 西南交通大学学报,2010,45(2):302-306.
|
[17] |
LONG Guilu.Grover Algorithm with Zero Theoretical Failure Rate[J]. Physical Review A, 2001, 64(2): 436-454.
|
[18] |
龙桂鲁,李岩松,肖丽,等. Grover 量子搜索算法及改进[J]. 原子核物理评论,2004,21(2):114-116.
|
[19] |
王勇. 新型数学难题及其在分组密码中的应用研究[J]. 信息网络安全,2014(11):79-82.
|