[1] Kocher P C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems [G]//CRYPTO'1996, LNCS 1440. Berlin: Springer, 1996: 104-113.
[2] Kocher P C, Jaffe J, Jun B. Differential Power Analysis[C]//CRYPTO'1999, LNCS 1666. Berlin: Springer, 1999: 388-397.
[3] Lano J, Mentens N, Preneel B, et al. Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism [C]//SASC 2004, Workshop Record. Berlin: Springer-Verlag, 2004: 327-333.
[4] Gierlichs B, Batina L, Clavier C, et al. Susceptibility of eSTREAM Candidates Towards Side Channel Analysis [EB/OL]. [2012-02-23]. http://www.ecrypt.eu.org/stvl/sasc2008/index.html
[5] Fischer W, Gammel B M, Kniffler O, et al. Differential Power Analysis of Stream Ciphers [C]//Advances in Cryptology-CT-RSA 2007, LNCS 4377. Berlin: Springer, 2006: 257-270.
[6] Burman S, Mukhopadhyay D, Veezhinathan K, et al. LFSR Based Stream Ciphers are Vulnerable to Power Attacks [C]//Advances in Crptology-INDOCRYPT'2007, LNCS 4859. Berlin: Springer, 2007: 384-392.
[7] Jia Yanyan, Hu Yupu, Gao Juntao. Correlation Power Analysis of the Software Implementation of DECIMv2 [J]. The Journal of China Universities of Posts and Telecommunications, 2011, 18(5): 118-123.
[8] Steve B, Julia B, Vesselin V. The eSTREAM Portfolio in 2012 (Jan 2012) [EB/OL]. [2012-02-23]. http://www.ecrypt.eu.org/stream/.
[9] Kumar S, Lemke K, Paar C. Some Thoughts about Implementation Properties of Stream Ciphers [C]//SASC 2004, Workshop Record. Berlin: Springer-Verlag, 2004: 311-319.
[10] Key E L. An Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators [J]. IEEE Trans on Information Theory, 1976, 22(11): 732-736.
[11] Tu Ziran, Deng Yingpu. Boolean Functions Optimizing Most of the Cryptographic Criteria [J]. Discrete Applied Mathematics, 2012, 160(4-5): 427-435.
[12] Zhang Weiguo, Xiao Guozhen. Construction of Almost Optimal Resilient Functions Via Concatenating Maiorana-mcfarland Functions[J]. Science China Information Sciences, 2011, 54(4): 909-912.
[13] 何业锋, 马文平. 一类具有高非线性度的密码函数[J]. 西安电子科技大学学报, 2010, 37(6): 1107-1110.
He Yefeng,Ma Wenping. One Class of Highly Nonlinear Cryptographic Functions [J]. Journal of Xidian University, 2010, 37(6): 1107-1110.
[14] Hell M, Johansson T, Meier W. Grain-a Stream Cipher for Constrained Environments [EB/OL]. [2012-02-23]. http://www.ecrypt.eu.org/stream/grainp3.html. |