FISCHER W,GAMMEL B M,KNIFFLER O,et al. Differential Power Analysis of Stream Ciphers[M]. Berlin:Topics in Cryptology-CT-RSA.Springer Berlin Heidelberg,2006:257-270.
[2]
DE CANNIERE C,PRENEELB T. New StreamCipher Designs[M]. Berlin:Springer Berlin Heidelberg,2008:244-266.
[3]
BABBAGE S H,DODD M W. The stream cipher MICKEY-128 2.0.eSTREAM, ECRYPT Stream Cipher Project[EB/OL]. (2003-01-01)[2014 -04 -10]. http://www. ecrypt. eu. org/stream/p2ciphers/mickey128/mickey128_p2. pdf.
[4]
KOCHER P,JAFFE J,JUN B. Differential power analysis[C]//Advances in Cryptology-CRYPTO’99. Birlin:Springer Berlin Heidelberg,1999:388-397.
[5]
BRIER E,CLAVIER C,OLIVIER F. Correlation Power Analysis with a Leakage Model[C]//Cryptographic Hardware and Embedded Systems-CHES. Birlin:Springer Berlin Heidelberg,2004:16-29.
[6]
MANGARD S,OSWALD E,POPP T. Power Analysis Attacks: Revealing the Secrets of Smart Cards[M]. Birlin:Springer Science & Business Media,2008.
[7]
KOCHER P,JAFFE J,JUN B,et al. Introduction to differential power analysis[J]. Journal of Cryptographic Engineering,2011,1(1):5-27.
[8]
MARTINASEK Z,MACHA T,RASO O,et al. Optimization of differential power analysis[J]. Przeglad Elektrotechniczny,2011,87(12):140-144.
[9]
WU K S,LI R F,WANG X D,et al. Simulation Platform for Differential Power Analysis Attack on DES[J]. Computer Science,2012,2:014.
[10]
BELAID S,BETTALE L,DOTTAX E,et al. Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model[C]//SECRYPT 2013-10th International Conference on Securityand Cryptography. Scitepress,2013.