參考文獻 |
[1] ISO/IEC 18033-3, “Information technology -- Security techniques -- Encryption algorithms --Part 3: Block ciphers”, 2005. Available at http://www.iso.ch/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=37972
[2] National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES)”, FIPS Publication 197, 2001. Available at http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
[3] National Bureau of Standards (NBS), “Data Encryption Standard (DES)”, FIPS Publication 46, 1977.
[4] ML Akkar, C Giraud, “An Implementation of DES and AES, Secure against Some Attacks”, CHES 2001, LNCS 2162, pp. 309-318, Springer-Verlag, 2001.
[5] C Clavier, JS Coron, N Dabbous, “Power Analysis in the Presence of Hardware Countermeasures”, CHES 2000, LNCS 1965, pp. 252-263, Springer-Verlag, 2000.
[6] JS Coron, P Kocher, D Naccache, “Statistics and Secret Leakage”, FC 2000, LNCS 1962, pp. 157-173, Springer-Verlag, 2001.
[7] JS Coron, E Prouff, M Rivain, “Side Channel Cryptanalysis of a Higherer Order Masking Scheme”, CHES 2007, LNCS 4727, pp. 28-44, Springer-Verlag, 2007.
[8] J Daemen, V Rijmen, “The Design of Rijndael, Version 2”, Submission to NIST, 1999. http://csrc.nist.gov/archive/aes
[9] JD Golic, C Tymen, “Multiplicative Masking and Power Analysis of AES”, CHES 2002, LNCS 2523, pp. 198-212, Springer-Verlag, 2003.
[10] C Herbst, E Oswald, and Stefan Mangard, “An AES Smart Card Implementation Resistant to Power Analysis Attacks”, ACNS 2006, LNCS 3989, pp. 239-252, Springer-Verlag, 2006.
[11] PC Kocher, JM Jaffe, BC Jun, “Differential Power Analysis”, CRYPTO 1999, LNCS 1666, pp. 388-397, Springer-Verlag, 1999.
[12] J Lu, J Pan, and J Hartog, “Security of AES Against First and Second-Order Differential Power Analysis”, WISSEC 2009. Available at http://www.uclouvain.be/crypto/wissec2009/static/5.pdf
[13] S Mangard, “Hardware Countermeasures against DPA – A Statistical Analysis of Their Effectiveness”, CT-RSA 2004, LNCS 2964, pp. 222-235, Springer-Verlag, 2004.
[14] S Mangard, E Oswald, T Popp, “Correlation Power Analysis with a Leakage Model”, CHES 2004, LNCS 3156, pp. 135-152, Springer-Verlag, 2004
[15] TS Messerges, “Using Second-Order Power Analysis to Attack DPA Resistant Software”, CHES 2000, LNCS 1965, pp. 238 - 251, Springer-Verlag, 2000.
[16] TS Messerges, “Securing the AES Finalists Against Power Analysis Attacks”, FSE 2000, LNCS 1978, pp. 293-301, Springer-Verlag, 2001.
[17] E Oswald, S Mangard, C Herbst, S Tillich, “Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers”, CT-RSA 2006, LNCS 3860, pp. 192-207, Springer-Verlag, 2006.
[18] E Oswald, S Mangard, N Pramstaller, “A Side-Channel Analysis Resistant Description of the AES S-Box”, FSE 2005, LNCS 3557, pp. 413-423, Springer-Verlag, 2005.
[19] K Schramm, C Paar, “Higher Order Masking of the AES”, CT-RSA 2006, LNCS 3860, pp. 208-225, Springer-Verlag, 2006.
[20] J Waddle, D Wagner, “Towards Efficient Second-Order Power Analysis”, CHES 2004, LNCS 3156, pp. 1-15, Springer-Verlag, 2004.
[21] 張吉天,於 8051 單晶片上實作可防禦 DPA 攻擊之AES加密器,國立中央大學密碼與資訊安全實驗室碩士論文,2004。
|