[1] Kocher P C.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[A].Annual International Cryptology Conference[C].Berlin,Heidelberg:Springer,1996.104-113.
[2] Chari S,Rao J R,Rohatgi P.Template attacks[A].International Workshop on Cryptographic Hardware and Embedded Systems[C].Berlin,Heidelberg:Springer,2002.13-28.
[3] Rechberger C,Oswald E.Practical template attacks[A].International Workshop on Information Security Applications[C].Berlin,Heidelberg:Springer,2004.440-456.
[4] Agrawal D,Rao J R,Rohatgi P,et al.Templates as master keys[A].International Workshop on Cryptographic Hardware and Embedded Systems[C].Berlin,Heidelberg:Springer,2005.15-29.
[5] Archambeau C,Peeters E,Standaert F X,et al.Template attacks in principal subspaces[A].Proceedings of the 8th International Conference on Cryptographic Hardware and Embedded Systems[C].USA:ACM,2006.1-14.
[6] DENG Gao-ming,ZHANG Peng,ZHAO Qiang.Formal analysis for cipher chip's security against template attack[A].Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering[C].USA:IEEE,2009.1741-1744.
[7] Gierlichs B,Lemke-Rust K,Paar C.Templates vs stochastic methods[A].International Workshop on Cryptographic Hardware and Embedded Systems[C].Berlin,Heidelberg:Springer,2006.15-29.
[8] Oswald D,Paar C.Breaking mifare DESFire MF3ICD40:power analysis and templates in the real world[A].International Workshop on Cryptographic Hardware and Embedded Systems[C].Berlin,Heidelberg:Springer,2011.207-222.
[9] WANG An,et al.Overcoming significant noise:correlation-template-induction attack[A].International Conference on Information Security Practice and Experience[C].Berlin,Heidelberg:Springer,2012.393-404.
[10] Lerman L,Medeiros S F,Veshchikov N,et al.Semi-supervised template attack[A].International Workshop on Constructive Side-Channel Analysis and Secure Design[C].Berlin,Heidelberg:Springer,2013.184-199.
[11] ZHANG H,FENG D,ZHOU Y.Mahalanobis Distance Similarity Measure Based Distinguisher for Template Attack[M].USA:John Wiley & Sons,Inc.2015.
[12] FAN G,ZHOU Y,ZHANG H,et al.Towards optimal leakage exploitation rate in template attacks[J].Security and Communication Networks,2016,9(16):3116-3126.
[13] Karimi N,Guilley S,Danger J L.Impact of aging on template attacks[A].Proceedings of the 2018 on Great Lakes Symposium on VLSI[C].USA:ACM,2018.455-458.
[14] ZHANG H,ZHOU Y.Template attack vs stochastic model:An empirical study on the performances of profiling attacks in real scenarios[J].Microprocessors and Microsystems,2019,66(4):43-54.
[15] ZHANG H.On the exact relationship between the success rate of template attack and different parameters[J].IEEE Transactions on Information Forensics and Security,2019,15(7):681-694.
[16] Batina L,Chmielewski ?,Papachristodoulou L,et al.Online template attacks[J].Journal of Cryptographic Engineering,2019,9(1):21-36.
[17] 樊昊鹏.Panda 2018数据集[OL].https://github.com/kistoday/Panda2018/tree/master/challeng1,2019-7-1.
[18] 崔琦,王思翔,段晓毅,等.一种AES算法的快速模板攻击方法[J].计算机应用研究,2017,34(6):1801-1804. CUI Qi,WANG Si-xiang,DUAN Xiao-yi,et al.A fast template attack method for AES algorithm[J].Computer Application Research,2017,34(6):1801-1804.(in Chinese)
[19] 欧长海,王竹,黄伟庆,等.基于汉明重量模型的密码设备放大模板攻击[J].密码学报,2015,2(5):477-486. OU Chang-hai,WANG Zhu,HUANG Wei-qing,et al.Amplification template attack of cryptographic device based on Hamming weight model[J].Journal of Cryptography,2015,2(5):477-486.(in Chinese)
[20] 刘飚,孙莹.基于公共协方差矩阵的实用模板攻击[J].计算机应用研究,2016,33(1):236-239. LIU Biao,SUN Ying.Practical template attack based on common covariance matrix[J].Computer Application Research,2016,33(1):236-239.(in Chinese) |