Wu H J, Huang T, Phuong H N, et al.. Differential attacks against stream cipher ZUC[C]. Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, 2012: 262-277.
|
Zhou C F, Feng X T, and Lin D D. The initialization stage analysis of ZUC v1.5[C]. Proceedings of the 10th International Conference, Sanya, China, 2011: 40-53.
|
Gautham S. The stream cipher core of the 3GPP encryption standard 128-EEA3: timing attacks and countermeasures[C]. Proceedings of the 7th International Conference, Beijing, China, 2011: 269-288.
|
L afitte F, M arkowitch O, and Vav Heule D. SAT based analysis of LTE stream cipher ZUC[C]. Proceedings of the 6th International Conference on Security of Information and Networks, Aksavay, Turkey, 2013: 110-116.
|
关杰, 丁林, 刘树凯. SNOW 3G与ZUC流密码的猜测决定攻击[J]. 软件学报, 2013, 24(6): 1324-1333.
|
Guan Jie, Ding Ling, and Liu Shu-kai. Guess and determine attack on SNOW 3G and ZUC[J]. Journal of Software, 2013, 24(6): 1324-1333.
|
唐明, 高剑, 孙乐昊, 等. 嵌入式平台下ZUC算法的侧信道频域攻击[J]. 山东大学学报(理学版), 2014, 49(9): 29-34.
|
Tang Ming, Gao Jian, Sun Le-hao, et al.. Side channel attacks in frequency domain for ZUC algorithm in embedded platform[J]. Journal of Shandong University(Natural Science), 2014, 49(9): 29-34.
|
Reddy E K. Overview of the side channel attacks[J]. Advanced Networking and Applications, 2013, 4(6): 1799-1808.
|
Paul K, Joshua J, Benjamin J, et al.. Introduction to differential power analysis[J]. Journal of Cryptography Engineering, 2011, 1(1): 5-27.
|
汪鹏君, 张跃军, 张学龙. 防御差分功耗分析攻击技术研究[J] 电子与信息学报, 2012, 34(11): 2774-2784.
|
Wang Peng-jun, Zhang Yue-jun, and Zhang Xue-long. Research of differential power analysis countermeasures[J]. Journal of Electronics Information Technology, 2012, 34(11): 2774-2784.
|
赵永斌, 胡予濮, 贾艳艳. 一种抵抗能量攻击的线性反馈移位寄存器[J]. 西安电子科技大学学报(自然科学版), 2013, 40(3): 172-179.
|
Zhao Yong-bin, Hu Yu-pu, and Jia Yan-yan. New design of LFSR based stream ciphers to resist power attack[J]. Journal of Xidian University (Natural Science), 2013, 40(3): 172-179.
|
Kumar S, Lemke K, and Paar C. Some thoughts about implementation properties of stream ciphers[C]. Proceedings of State of the Art of Stream Ciphers Workshop, Brugge, Belgium, 2004: 311-319.
|
Stefan M, Elisabeth O, and Thomas P著. 冯登国, 周永斌, 刘继业, 等译. 能量分析攻击[M]. 北京: 科学出版社, 2010: 45-46.
|
金晨辉, 郑浩然, 张少武, 等. 密码学[M]. 北京: 高等教育出版社, 2009: 149-150.
|
Jin Chen-hui, Zheng Hao-ran, Zhang Shao-wu, et al.. Cryptography[M]. Beijing: Higher Education Press, 2009: 149-150.
|
杨昌盛, 于敬超, 严迎建. Grain-128同步流密码的选择初始向量相关性能量攻击[J]. 计算机应用, 2014, 34(5): 1318-1321.
|
Yang Chang-sheng, Yu Jing-chao, and Yan Yin-jian. Chosen initial vector correlation power attack on synchronous stream cipher Grain-128[J]. Journal of Computer Applications, 2014, 34(5): 1318-1321.
|
刘泽艺, 高能, 屠晨阳, 等. 一种抗能量分析攻击的复合寄存器系统[J]. 密码学报, 2014, 1(5): 411-421.
|
Liu Ze-yi, Gao Neng, Tu Chen-yang, et al.. A compound register system against power analysis attack[J]. Journal of Cryptologic Research, 2014, 1(5): 411-421.
|
刘会英, 赵新杰, 王韬, 等. 基于汉明重的SMS4密码代数旁路攻击研究[J]. 计算机学报, 2013, 36(6): 1183-1193.
|
Liu Hui-yin, Zhao Xin-jie, Wang Tao, et al.. Research on hamming weight-based algebraic side-channel attacks on SMS4[J]. Chinese Journal of Computers, 2013, 36(6): 1183-1193.
|