[1]
PAUL C KOCHER, JOSHUA JAFFE, and BENJAMIN JUN. Differential Power Analysis: 19th Annual International Cryptology Conference[C]. California: Advances in Cryptology, 1999, 388–397.
DOI: 10.1007/3-540-48405-1_25
Google Scholar
[2]
Quisquater, J.J., Samyde, D.: Electromagnetic analysis (EMA): Measures and counter-measures for smart cards. In: E-smart. p.2001, 200-210.
DOI: 10.1007/3-540-45418-7_17
Google Scholar
[3]
KarineGandolfi, Christophe Mourtel, and Francis Olivier. Electromagnetic Analysis: Concrete Results. In Cryptographic Hardware and Embedded Systems - CHES2001, Third International Workshop, pages 2001, 251-261.
DOI: 10.1007/3-540-44709-1_21
Google Scholar
[4]
Paul Kocher, Timing Attack on Implementation of Diffe-Hellman, RSA, DSS and other Systems, " Advances in Cryptology; proceedings of Crypto , 96. New York, Springer-Verlag, (1996).
DOI: 10.1007/3-540-68697-5_9
Google Scholar
[5]
CHEN Cai-sen, WANG Tao, ZHENG Yuan-yuan. Timing Attacks and Defenses on RSA Public-key Algorithms[J], Computer engineering, 2009, 35(2): 123-125.
Google Scholar
[6]
Korobogatov S. Semi-invasive attacks -a new approach to hardware security analysis[D]. London: University of Cambridge, Computer Laboratory, April (2005).
Google Scholar
[7]
S. Skorobogatov, R. Anderson, Optical Fault Induction Attacks, Cryptographic Hardware and Embedded Systems Workshop, California, (2002).
DOI: 10.1007/3-540-36400-5_2
Google Scholar
[8]
Dan Boneh, Richard A. DeMillo, and Richard J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, International Conference on the Theory and Application of Cryptographic Techniques, onstanz, (1997).
DOI: 10.1007/3-540-69053-0_4
Google Scholar