參考文獻 |
[1]M.-L. Akkar, R. Bevan, P. Dischamp and D. Moyart, “Power Analysis, What Is Now Possible,” Advance in Cryptology - ASIACRYPT 2000, Lecture Notes in Computer Science1976, Springer-Verlag, 2000, pp. 489-502
[2]“Analysis of the floating point flaw in the Pentium processor,” Nov. 1994 http://www.intel.com/procs/support/pentium/fdiv/white11/index.htm
[3]R. Anderson and M. Kuhn, “Tamper Resistance - a Cautionary Note,” Proceedings of the 2nd Workshop on Electronic Commerce, pp.1-11, 1996
[4]R. Anderson and M. Kuhn, “Low Cost attacks on Tamper Resistant Devices,” Proceedings of the 1997 Security Protocols Workshop, Paris, Lecture Notes in Computer Science 1361, Springer-Verlag, 1997, pp. 125-136.
[5]E. Biham and A. Shamir, “Differential Fault Analysis of Secret Key Cryptosystems,” Advances in Cryptology - CRYPTO'97, Lecture Notes in Computer Science vol. 1249, Springer-Verlag, 1997, pp. 513-525
[6]E. Biham and A. Shamir, “Power Analysis of the Key Scheduling of the AES Candidates,” Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, Mar. 1999
[7]D. Boneh, R.A. Demillo and R.J. Lipton, “On the Importance of Checking Cryptographic Protocols for faults,” Advance in Cryptology - EUROCRYPT'97, Lecture Notes in Computer Science, Springer-Verlag, 1997, pp.37-51
[8]S. Chari, C.S. Jutla, J.R. Rao and P. Rohatgi, “A Cautionary Note regarding Evaluation of AES Candidates on Smart-Cards,” Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, Mar. 1999
[9]D. Chaum, “Blind Signatures for Untraceable Payments,” Advances in Cryptology-CRYPTO'82, Plenum Press, 1983, pp. 199-203
[10]J.-S. Coron and L. Goubin, “On Boolean and Arithmetic Masking against Differential Power Analysis,” Proceedings of Cryptographic Hardware and Embedded Systems '00, Lecture Notes in Computer Science, Springer-Verlag, 2000
[11]J. Daemen and V. Rijmen, “AES proposal: Rijndael,” Proceedings of the First Advanced Encryption Standard (AES) Conference, Aug. 1998
[12]J.-F. Dhem, F. Koeune, P.-A. Leroux, P. Mestre, J.-J. Quisquater and J.-L. Willems, “A practical implementation of the timing attack,” Crypto Group Technical Report Series CG--1998/1, Universit'e Catholique de Louvain and Proceedings of the CARDIS 1998, 1998
[13]S.E. Eldridge and C.D. Walter, “Hardware Implementation of Montgomery's Modular Multiplication Algorithm,” IEEE Trans. on computers, V.42, n. 6, pp. 693-699, Jun. 1993
[14]J.J. Farrell III, “Smartcards become an international technology,” TRON Project International Symposium, 1996. TEPS '96, 1996, pp. 134-140
[15]U. Feige, A. Fiat and A. Shamir, “Zero knowledge proofs of identity,” Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 77-94
[16]D.M. Gordon, “A survey of fast exponentiation methods,” Journal of Algorithms, 27, 1998. pp. 129-146
[17]G. Hachez, F. Koeune, and J.-J. Quisquater, “Timing Attack: What Can Be Achieved By A Powerful Adversary?,” Proceedings of the 20th symposium on Information Theory in the Benelux, May 1999, pp. 63-70
[18]H. Handschuh, “A Timing Attack on RC5,” Proceedings of the Workshop on Selected Areas in Cryptography - SAC'98, Springer-Verlag, Aug 1998
[19]J. Kelsey, B. Schneier, D. Wagner and C. Hall, “Side Channel Cryptanalysis of Product Ciphers,” Computer Security-ESORICS'98, Lecture Notes in Computer Science 1485, Springer-Verlag, 1998
[20]J. Kilian and P. Rogaway, “How to Protect DES Against Exhaustive Key Search,” Advances in Cryptology-CRYPTO'96, Springer-Verlag,1996, pp. 252-267
[21]C.K. Koc, T. Acar and B.S. Kaliski,Jr., “Analyzing and comparing Montgomery multiplication algorithms,” IEEE Micro, Volume: 16 Issue: 3 , June 1996 pp. 26 -33
[22]P.C. Kocher, “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,” Advance in Cryptology - CRYPTO'96, Lecture Notes in Computer Science, Springer-Verlag, 1996, pp. 104-113
[23]P. Kocher, J. Jaffe and B. Jun, “Differential Power Analysis,” Advance in Cryptology - CRYPTO'99, Springer-Verlag, 1999, pp. 388-397
[24]P. Kocher, J. Jaffe and B. Jun, “Introduction to Differential Power Analysis and Related Attacks,” 1998, http://www.cryptography.com/dpa/technical
[25]F. Koeune, and J.-J. Quisquater, “A Timing Attack against Rijndael,” Crypto Group Technical Report Series CG--1999/1, Universit'e Catholique de Louvain., 1999
[26]O. Kommerling and M. G. Kuhn, “Design Principles for Tamper-Resistant Smartcard Processors,” Proceedings of USENIX Workshop on smartcard Technology (Smartcard'99), May 1999, pp. 9-20
[27]M. Kuhn, “Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP,” IEEE Trans. on computers, v. 47, n. 10, pp. 1153-1157, Oct 1998
[28]X. Lai, On the Design and Security of Block Ciphers, ETH Series in Information Processing, v.1, Konstanz: Hartung-gorre Verlag, 1992
[29]A. Menezes, P. van Oorschot and S. Vanstone, “Handbook of Applied Cryptography,” CRC Press, 1996
[30]T.S. Messerges, “Securing the AES Finalists Against Power Analysis Attacks,” Proceedings of Fast Software Encryption Workshop 2000, Lecture Notes in Computer Science, Springer-Verlag, Apr. 2000
[31]T.S. Messerges, E.A. Dabbish and R.H. Sloan, “Investigations of Power Analysis Attacks on Smartcards,” Proceedings of USENIX Workshop on smartcard Technology, May 1999, pp. 151-161
[32]D. Naccache and D. M'Raihi, “Cryptographic Smart Cards,” IEEE Micro, Volume: 16 Issue: 3 , June 1996 pp. 15 -24
[33]National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46,Jan 1977
[34]B.J. Phillips and N. Burgess, “Algorithms for Exponentiation of Long Integers - A Survey of Published Algorithms,” The University of ADELAIDE, Centre for Gallium Arsenide VLSI Technology, Digital Arithmetic Group, May 1996
[35]R. Rivest, “The RC5 Encryption Algorithm,” Proceedings of Second International Workshop on Fast Software Encryption, 1994, pp. 86-96
[36]R. Rivest, M.J.B. Robshaw, R. Sidney, and Y.L. Yin, “The RC6 Block Cipher,” Technical Report of RSA Laboratory, 1998
[37]R.L. Rivest, A. Shamir, and L.M. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, v. 21, n. 2, pp. 120-126, Feb 1978
[38]V. Taponen, “Tamper-resistant Smart Cards - Too Much To Ask For?,” HUT TML 2000 Tik-110.501 Seminar on Network Security; http://www.hut.fi/~vtaponen/draft40.html 2000
[39]C.D. Walter, “Exponentiation Using Division Chains” IEEE Trans. on computers, V.47, n. 7, pp. 757-765, Jul. 1998
[40]S.-M. Yen and M. Joye, “Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis,” IEEE Trans. on computers, v. 49, n. 9, pp. 967-970, Sep 2000 |