참고문헌
- P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", Crypto 1999, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
- M.-L. Akkar, C. Giraud, "An Implementation of DES and AES, Secure against Some Attacks", CHES 2001, LNCS 2162, pp. 309-318, Springer-Verlag, 2001.
- J. Blomer, J. Guajardo, V. Krummel, "Provably Secure Masking of AES", SEC 2005, LNCS 3357, pp.69-83, Springer-Verlag, 2005.
- C. Herbst, E. Oswald, S. Mangard, "An AES Smart Card Implementation Resistant to Power Analysis Attacks", ACNS 2006, LNCS 3989, pp.239-252, Springer-Verlag, 2006.
- H. Kim, T.H. Kim, D.-G. Han, S. Hong, "Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES", ETRI Journal. Vol.32, No.3. 2010, pp.370-379. https://doi.org/10.4218/etrij.10.0109.0181
- E. Oswald, S. Mangard, N. Pramstaller, "A Side-Channel Analysis Resistant Description of the AES S-Box", FSE 2005, LNCS 3557, pp.199-228, Springer-Verlag, 2005.
- E. Oswald, K. Schramm, "An Efficient Masking Scheme for AES Software Implementations", WISA 2005, LNCS 3786, pp. 292-305, Springer-Verlag, 2006.
- H. Kim, Y.I. Cho, D. Choi, D.-G. Han, S. Hong, "Efficient Masked Implementation for SEED Based on Combined Masking," ETRI Journal. Vol.33, No.2, 2011, pp.267-274. https://doi.org/10.4218/etrij.11.1510.0112
- T. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software", CHES 2000, LNCS 1965, pp. 238-251, Springer-Verlag, 2000.
- M. Joye, P. Paillier, B. Schoenmakers, "On Second-Order Differential Power Analysis", CHES 2005, LNCS 3659, pp. 293-308, Springer-Verlag, 2005.
- E. Oswald, S. Mangard, C. Herbst, and S. Tillich, "Practical second-order DPA attacks for masked smart card implementations of block ciphers", CT-RSA 2006, LNCS 3860, pp.192-207, Springer-Verlag, 2006.
- K. Schramm, C. Paar, and D. Pointcheval, "Higher Order Masking of the AES", CT-RSA 2006, LNCS 3860, pp. 208-225, Springer-Verlag, 2006.
- E. Prouff, M. Rivain, and R. Bevan, "Statistical Analysis of Second Order Differential Power Analysis", IEEE Transactions on Computers, Vol.58, No.6. 2009, pp.799-811. https://doi.org/10.1109/TC.2009.15
- K. Schramm, G. Leander, P. Felke, C. Paar, "A Collision Attack on AES: Combining Side Channel and Differential Attack", CHES 2004, LNCS 3156, pp.163-175, Springer- Verlag, 2004.
- A. Bogdanov, "Improved Side-Channel Collision Attacks on AES", SAC 2007, LNCS 4876, pp.84-95. Springer-Verlag, 2007.
- A. Moradi, O. Mischke, and T. Eisenbarth, "Correlation- Enhanced Power Analysis Collision Attack", CHES 2010, LNCS 6225, pp.125-139. Springer-Verlag, 2010.
- C. Clavier, B. Feix, G. Gagnerot, M. Roussellet, and V. Verneuil, "Improved Collision-Correlation Power Analysis on First Order Protected AES", CHES 2011, LNCS 6917, pp.49-62, Springer-Verlag, 2011.
- G. Welchman, "The Hut Six Story: Breaking the Enigma Codes", New York, McGraw-Hill, 1982.
- S. Mangard, E. Oswald, and T. Popp, "Power Analysis Attack: Revealing the Secrets of Smart Cards", Springer, 2007.
- J. Daemen and V. Rijmen, "AES Proposal: Rijndael." 1998.