Computer Science ›› 2016, Vol. 43 ›› Issue (2): 169-174.doi: 10.11896/j.issn.1002-137X.2016.02.037
Previous Articles Next Articles
LI Lang and DU Guo-quan
[1] Renauld M,Standaert F X.Algebraic side-channel attacks[C]∥Proceedings of Information Security and Cryptology.Heidelberg:Springer Berlin,2009:393-410 [2] Renauld M,Standaert F-X.Representation,leakage and cipher- dependencies in algebraic side-channel attacks[C]∥ Proceedings of Industrial Track of ACNS.Heidelberg:Springer Berlin,2010:1-18 [3] Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[C]∥Proceedings of Cryptography Hardware and Embedded Systems.Heidelberg:Springer Berlin,2004:16-29 [4] Renauld M,Standaert F X.Algebraic side-channel attacks on the AES:Why time also matters in DPA[C]∥ Proceedings of cryptography Hardware and Embedded Systems 2009.Heidelberg:Springer Berlin,2009:97-111 [5] Mohamed M S E,Bulygin S,Zohner M,et al.Improved algebraic side channel attack on AES[J].Journal of Cryptographic Engineering,2013,3(3):139-156 [6] Schramm K,Leander G,Felke P,et al.A collision-attack onAES combining side channel and differential attack[C]∥ Proceedings of Cryptography Hardware and Embedded Systems.Heidelberg:Springer Berlin,2004:163-175 [7] Liu Hui-ying,Zhao Xin-jie,Wang Tao,et al.Research on Hamming Weight-based Algebraic Side-Channel attacks on SMS4[J].Chinese Journal of Computers,2013,6(6):1183-1193(in Chinese) 刘会英,赵新杰,王韬,等.基于汉明重SMS4密码代数旁路攻击研究[J].计算机学报,2013,6(6):1183-1193 [8] Ji Ke-ke,Wang Tao,Guo Shi-ze,et al.Research of HammingWeight-based algebraic side-channel attack on LED[J].Journal on Communications,2013,4(7):134-142(in Chinese) 冀可可,王韬,郭世泽,等.基于汉明重的LED代数旁路攻击研究[J].通信学报,2013,4(7):134-142 [9] Ferhat K.ITUbee:A Software Oriented Lightweight Block Cipher[C]∥Proceedings of Lightweight Cryptography for Security and Privacy 2013.Heidelberg:Springer Berlin,2013:16-27 [10] Carlet C,Faugère J-C,Goyet C,et al.Analysis of the algebraic side channel attack[J].Journal of Cryptographic Engineering,2012,2(1):45-62 [11] Zhang Guo-ji,Xiao Huang-pei.Quadratic Equations on S-Boxes and a New S-Box Design Criterion[J].Journal of South china University of Technology(Natural Science Edition),2008,6(8):140-144(in Chinese) 张国基,肖黄培.S盒的二次方程及一个新的设计准则[J].华南理工大学学报,2008,6(8):140-144 [12] Fischer S,Meier W.Algebraic immunity of S-boxes and augmented functions[C]∥ Proceedings of Foundations of Software Engineering.Heidelberg:Springer Berlin,2007:366-381 [13] Armknecht F,Krause M.Constructing single and multi-output Boolean functions with maximal immunity[C]∥ Proceedings of International Colloquium on Automata,Languages and Programming.Heidelberg:Springer Berlin,2006:180-191 [14] Carlet C.On the algebraic immunities and higher order nonli-nearities of vectorial Boolean functions[C]∥ Proceedings of NATO Science for Peace and Security Series,D:Information and Communication Security.Heidelberg:Springer Berlin,2009:104-116 [15] Oren Y,Kirschbaum M,Popp T,et al.Algebraic side-channelanalysis in the presence of errors[C]∥ Proceedings of Cryptography Hardware and Embedded Systems.Heidelberg:Springer Berlin,2010:428-442 [16] Bogdanov A,Kizhvatov I,Pyshkin A.Algebraic Methods inSide-Channel Collision Attacks and Practical Collision Detection[C]∥ Proceedings of INDOCRYPT.Berlin:Springer,2008:251-265 [17] Moradi A,Mischke O,Eisenbarth T.Correlation-enhancedpower analysis collision attack[C]∥ Proceedings of Cryptography Hardware and Embedded Systems.Heidelberg:Springer Berlin,2010:125-139 [18] Oren Y,Kirschbaum M,Popp T,et al.Algebraic side channel analysis in the presence of errors[C]∥ Proceedings of Cryptography Hardware and Embedded Systems.Heidelberg:Springer Berlin,2010:428-442 [19] Whitnall C,Oswald E,Mather L.An exploration of the kolmogorov-smirnov test as competitor to mutual information analysis[EB/OL].[2011-03-08].http:// eprint.iacr.org/2011/380.pdf [20] Knudsen L R,Miolance C V.Counting equations in algebraic attacks on block ciphers[J].International Journal of Information Security,2010,9(2):127-135 [21] Soos M,Nohl K,Castelluccia C.Extending SAT solvers to cryptographic problems[C]∥ Proceedings of Lecture Notes in Computer Science.Heidelberg:Springer Berlin,2009:244-257 |
No related articles found! |
|