Boneh D, DeMillo R A, and Lipton R J. On the importance of checking cryptographic protocols for faults[J].EUROCRYPT97, Konstanz, Germany.1997, LNCS 1233:37-51[2]Biham E and Shamir A. Differential fault analysis of secret key cryptosystems[J].CRYPTO97, California, USA.1997, LNCS 1294:513-525[3]Biehl I, Meyer B, and Mller V. Differential fault attacks on elliptic curve cryptosystems. CRYPTO 2000, California, USA, 2000, LNCS 1880: 131-146.[4]Hemme L. A differential fault attack against early rounds of (Triple-) DES. Cryptographic Hardware and Embedded Systems-CHES 2004. Boston, 2004, LNCS 3156: 254-267.[5]张蕾, 吴文玲. SMS4密码算法的差分故障攻击. 计算机学报, 2006, 29(9): 1596-1602.Zhang Lei and Wu Wen-ling. Differential fault analysis on SMS4. Chinese Journal of Computers, 2006, 29(9): 1596-1602.[6]Li Wei, Gu Da-wu, and Li Juan-ru. Differential fault analysis on the ARIA algorithm[J].Information Sciences.2008, 178(19):3727-3737[7]李玮, 谷大武. 基于密钥编排故障的SMS4算法的差分故障分析. 通信学报, 2008, 29(10): 135-142.Li Wei and Gu Da-wu. Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule. Journal of China Institute of Communications, 2008, 29(10): 135-142.[8]Chen Hua, Wu Wen-ling, and Feng Deng-guo. Differential fault analysis on CLEFIA. International Conference on Information and Communication Security-ICICS 2007, Zhengzhou, China, 2007, LNCS 4861: 284-295.[9]Piret G and Quisquater J J. A differential fault attack technique against SPN Structures, with Application to the AES and KHAZAD. Cryptographic Hardware and Embedded Systems-CHES 2003.Cologne, 2003, LNCS 2779: 77-88.[10]李琳, 李瑞林, 谢端强, 李超. KeeLoq和SHACAL-1算法的差分故障攻击. 武汉大学学报, 2008, 54(5): 507-512.Li Lin, Li Rui-lin, Xie Duan-qiang, and Li Chao. Differential Fault Analysis on Keeloq and SHACAL-1. Journal of Wuhan University, 2008, 54(5): 507-512.[11]NIST. FIPS-180-2: Secure Hash Standard(SHS). 2002.
|