References
- National Bureau of Standards, “Data Encryption Standard,” Federal Information Processing Standards Publication 46, Jan. 1977.
- P.C. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” Proc. CRYPTO 1999, LNCS, vol. 1666, 1999 pp. 388-397.
- H. Handschuh and B. Preneel, “Blind Differential Cryptanalysis for Enhanced Power Attacks,” Proc. SAC 2006, LNCS, vol. 4356, 2007 pp. 163-173.
- L.R. Knudsen, “Truncated and Higher Order Differentials,” Proc. FSE 1994, LNCS, vol. 1008, 1995, pp. 196-211.
- M.L. Akkar, R. Bevan, and L. Goubin, “Two Power Analysis Attacks against One-Mask Methods,” Proc. CHES 2004, LNCS, vol. 3156, 2004, pp. 332-347.
Cited by
- Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm vol.11, pp.6, 2009, https://doi.org/10.1109/jcn.2009.6388409
- 축소 마스킹이 적용된 경량 블록 암호 LEA-128에 대한 부채널 공격 vol.25, pp.2, 2009, https://doi.org/10.13089/jkiisc.2015.25.2.253
- 축소 마스킹이 적용된 경량 블록 암호 알고리즘 SIMON 패밀리에 대한 부채널 공격 vol.27, pp.4, 2009, https://doi.org/10.13089/jkiisc.2017.27.4.923