Citation: | FAN Guangjun, ZHOU Yongbin, ZHANG Hailong, et al., “The Cognition Is Not Enough: Another Look on Existing Interesting Points Chosen Methods,” Chinese Journal of Electronics, vol. 26, no. 2, pp. 416-423, 2017, doi: 10.1049/cje.2017.01.030 |
S. Chari, J.R. Rao and P. Rohatgi, "Template attacks", Workshop on Cryptographic Hardware and Embedded Systems, Redwood City, USA, pp.13-28, 2002.
|
C. Rechberger and E. Oswald, "Practical template attacks", International Workshop on Information Security Applications, Jeju Island, Korea, pp.440-456, 2004.
|
C. Archambeau, E. Peeters, F.-X. Standaert and J.-J. Quisquater, "Template attacks in principal subspaces", Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, Japan, pp.1-14, 2006.
|
N. Hanley, M. Tunstall and W.P. Marnane, "Unknown plaintext template attacks", International Workshop on Information Security Applications, Jeju Island, Korea, pp.148-162, 2009.
|
B. Gierlichs, K. Lemke-Rust and C. Paar, "Templates vs. stochastic methods a performance analysis for side channel cryptanalysis", Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, Japan, pp.15-29, 2006.
|
S. Mangard, E. Oswald and T. Popp, Power Analysis Attacks:Revealing the Secrets of Smart Cards, Springer US, US, 2007.
|
L. Mather, E. Oswald, J. Bandenburg and M. Wójcik, "Does my device leak information? An a priori statistical power analysis of leakage detection tests", Asiacrypt, Bengaluru, India, pp.486-505, 2013.
|
B. Gierlichs, L. Batina, P. Tuyls and B. Preneel, "Mutual information analysis", Workshop on Cryptographic Hardware and Embedded Systems, Washington, DC, USA, pp.426-442, 2008.
|
C. Whitnall, E. Oswald and L. Mather, "An exploration of the Kolmogorov-Smirnov test as a competitor to mutual information analysis", Smart Card Research and Advanced Application Conference, Passau, Germany, pp.234-251, 2011.
|
O. Choudary and M.G. Kuhn, "Efficient template attacks", Smart Card Research and Advanced Application Conference, Berlin, Germany, pp.253-270, 2013.
|
E. Oswald and S. Mangard, "Template attacks on masking-resistance is futile", The Cryptographers' Track at the RSA Conference, pp.243-256, 2007.
|
D.P. Montminy, R.O. Baldwin, M.A. Temple and E.D. Laspe, "Improving cross-device attacks using zero-mean unit-variance normalization", Journal of Cryptographic Engineering, Vol.3, No.2, pp.99-110, 2013.
|
W. Schindler, K. Lemke and C. Paar, "A stochastic model for differential side channel cryptanalysis", Workshop on Cryptographic Hardware and Embedded Systems, Edinburgh, UK, pp.30-46, 2005.
|
F.-X. Standaert and C. Archambeau, "Using subspace-based template attacks to compare and combine power and electromagnetic information leakages", Workshop on Cryptographic Hardware and Embedded Systems, Washington, DC, USA, pp.411-425, 2008.
|
I. Jolliffe, Principal Component Analysis, Wiley, Chichester, UK, 2005.
|
F.-X. Standaert, T.G. Malkin and M. Yung, "A unified framework for the analysis of side-channel key recovery attacks", Eurocrypt, Cologne, Germany, pp.443-461, 2009.
|