Citation: | ZHAO Yiqiang, WANG Qingya, MA Haocheng, ZHANG Qizhi, YE Mao, WANG Hanning, HE Jiaji. Side Channel Analysis Optimization Method Based on Data Preprocessing[J]. Journal of Electronics & Information Technology, 2023, 45(1): 49-58. doi: 10.11999/JEIT211462 |
[1] |
NIST. FIPS 140-3 Security requirements for cryptographic modules[S]. Gaithersburg, USA: NIST, 2019.
|
[2] |
国家密码管理局. GM/T 0028-2014 密码模块安全技术要求[S]. 北京: 中国标准出版社, 2014.
State Cryptography Administration. GM/T 0028-2014 Security requirements for cryptographic modules[S]. Beijing: Standards Press of China, 2014.
|
[3] |
国家密码管理局. GM/T 0008-2012 安全芯片密码检测准则[S]. 北京: 中国标准出版社, 2012.
State Cryptography Administration. GM/T 0008-2012 Cryptography test criteria for security IC[S]. Beijing: Standards Press of China, 2012.
|
[4] |
CHARI S, RAO J R, and ROHATGI P. Template attacks[C]. 4th International Workshop on Cryptographic Hardware & Embedded Systems, Redwood Shores, USA, 2003: 13–28.
|
[5] |
LE T H, CLEDIERE J, SERVIERE C, et al. Noise reduction in side channel attack using fourth-order cumulants[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(4): 710–720. doi: 10.1109/TIFS.2007.910252
|
[6] |
LIU Wei, WU Liji, ZHANG Xiangmin, et al. Wavelet-based noise reduction in power analysis attack[C]. The 10th International Conference on Computational Intelligence and Security, Kunming, China, 2014: 405–409.
|
[7] |
FLANDRIN P, GONÇALVÈS P, and RILLING G. EMD equivalent filter banks, from interpretation to applications[M]. HUANG N E, SHEN S S P. Hilbert-Huang Transform and its Applications. Singapore: World Scientific Publishing Co., 2005: 57–74.
|
[8] |
CHENG Kefei, SONG Ziyan, CUI Xiaotong, et al. Hybrid denoising based correlation power analysis for AES[C]. 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Chongqing, China, 2021: 1192–1195.
|
[9] |
MÜLLER M. Dynamic time warping[M]. MÜLLER M. Information Retrieval for Music and Motion. Berlin Heidelberg: Springer, 2007: 69–84.
|
[10] |
VAN WOUDENBERG J G J, WITTEMAN M F, and BAKKER B. Improving differential power analysis by elastic alignment[C]. International Conference on Topics in Cryptology, San Francisco, USA, 2011: 104–119.
|
[11] |
ZHANG Fan, DONG Xiaofei, YANG Bolin, et al. A systematic evaluation of wavelet-based attack framework on random delay countermeasures[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 1407–1422. doi: 10.1109/TIFS.2019.2941774
|
[12] |
袁庆军, 王安, 王永娟, 等. 基于流形学习能量数据预处理的模板攻击优化方法[J]. 电子与信息学报, 2020, 42(8): 1853–1861. doi: 10.11999/JEIT190598
YUAN Qingjun, WANG An, WANG Yongjuan, et al. An improved template analysis method based on power traces preprocessing with manifold learning[J]. Journal of Electronics &Information Technology, 2020, 42(8): 1853–1861. doi: 10.11999/JEIT190598
|
[13] |
JIA Anni, YANG Wei, and ZHANG Gongxuan. Side channel leakage alignment based on longest common subsequence[C]. 2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE), Guangzhou, China, 2020: 130–137.
|
[14] |
程小明, 林金森, 张正国. 高分辨心电图中模板匹配算法的改进[J]. 中国生物医学工程学报, 1999, 18(1): 89–96,108. doi: 10.3969/j.issn.0258-8021.1999.01.012
CHENG Xiaoming, LIN Jinsen, and ZHANG Zhengguo. An improved template matching method for high resolution ECG[J]. Chinese Journal of Biomedical Engineering, 1999, 18(1): 89–96,108. doi: 10.3969/j.issn.0258-8021.1999.01.012
|
[15] |
李衡. 基于小波降噪数据预处理的硬件木马检测优化[D]. [硕士论文], 河北工业大学, 2016.
LI Heng. Hardware Trojan detection optimization based on wavelet de-noising data preprocessing[D]. [Master dissertation], Hebei University of Technology, 2016.
|
[16] |
CHOWDHURY S K R and CHATTERJEE A. Speech enhancement using K-sparse autoencoder techniques[C]. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India, 2021: 518–525.
|
[17] |
张春蕾. 变形信号的去噪方法与去噪效果评价指标改进[J]. 浙江测绘, 2010(1): 13–14.
ZHANG Chunlei. The denoising method and evaluation index of deformable signal are improved[J]. Zhejiang Surveying and Mapping, 2010(1): 13–14.
|
[18] |
段二朋. 分组密码芯片的电磁分析攻击技术研究[D]. [硕士论文], 解放军信息工程大学, 2012.
DUAN Erpeng. The research on electromagnetic analysis attack for block crypto chips[D]. [Master dissertation], Information Engineering University, 2012.
|
[19] |
陈华, 习伟, 范丽敏, 等. 密码产品的侧信道分析与评估[J]. 电子与信息学报, 2020, 42(8): 1836–1845. doi: 10.11999/JEIT190853
CHEN Hua, XI Wei, FAN Limin, et al. Side channel analysis and evaluation on cryptographic products[J]. Journal of Electronics &Information Technology, 2020, 42(8): 1836–1845. doi: 10.11999/JEIT190853
|