참고문헌
- P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO 1999, LNCS 1666, pp. 388-397, Santa Barbara, USA, Aug. 1999.
- Keke Wu, Huiyun Li, Bo Peng, and Fengqi Yu, "Correlation Power Analysis Attack against Synchronous Stream Ciphers," ICYCS 2008, IEEE Computer Society, pp. 2067-2072, Zhang Jia Jie, China, Nov. 2008.
- The eSTREAM Project, http://www.ecrypt.eu.org/stream
- ISO/IEC 18033-4, "Amendment 1 - Information technology - security techniques - Encryption algorithms - Part 4: Stream ciphers," JTC 1/SC 27(IT security tech.), http://www.iso.org, 2009.
- M. Boesgaard, M. Vesterager, T. Pedersen, J. Christiansen, and O. Scavenius. "Rabbit: A new high-performance stream cipher," FSE 2003, LNCS 2887, pp. 307 - 329, Lund, Sweden, Feb. 2003.
- B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, Helena H, T. Kasper, K .Lemkerust, S. Mangard, A. Moradi and E. Oswald, "Susceptible of eSTREAM Candidates towards Side Channel Analysis," SASC 2008, pp. 123-150, Lausanne, Switzerland, Feb. 2008.
- 배기석, 안만기, 박제훈, 이훈재, 문상재, "스트림 암호 Rabbit에 대한 전력분석 공격," 정보보호학회 논문지, 제21권 제3호, pp.27-36, 2011.
- S. Tillich and C. Herbert, "Attacking State-of-the-Art Software Countermeasures - A Case Study for AES," CHES 2008, LNCS 5154, pp. 228-243, Washington, D.C., USA, Aug. 2008.
- E. Oswald, S. Mangard, N. Pramstaller, and V. Rijmen. "A Side-Channel Analysis Resistant Description of the AES S-box", FSE 2005, LNCS 3557, pp.21-23, Paris, France, Feb. 2005.
- E. Prouff, C. Giraud and S. Aumônier, "Provably Secure S-Box Implementation Based on Fourier Transform", CHES 2006, LNCS 4249, pp.216-230, Yokohama, Japan, Oct. 2006.
- S. Tillich, C. Herbst, and S. Mangard, "Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis", ACNS 2007, pp. 141-157, Zhuhai, China, June 2007.
- M. Rivain, E. Prou, and J. Doget. "Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers," CHES 2009, LNCS 5747, pp. 171-188, Lausanne, Switzerland, Sept. 2009.
- 조영인, 김희석, 한동국, 홍석희, 강주성, "마스킹 형태 변환 알고리즘에 대한 새로운 전력분석 공격," 전자공학회 논문지, 제47권 SP편, 제1호, 2010.
- Ilya Mironov, "(Not So) Random Shuffles of RC4," CRYPTO 2002, LNCS 2442, pp. 304-319, Santa Barbara, USA, Aug. 2002.
- S. Mangard, "Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness," CT-RSA 2004, LNCS 2964, pp. 222-235, San Francisco, USA, Feb. 2004.