1[1]Data Encryption Standard. Federal information processing standard (FIPS) Publication 46. National Bureau of Standards, US Department of Commerce, Washington DC, 1977
2[2]Menezes A.,van Oorschot P. ,Vanstone S..Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 1996
3[3]Anderson, Kuhn M. G.. Low cost attacks on tamper resistant devices. In: Proceedings of the 5th International Workshop on Security Protocols, Paris, 1997, 125~136
4[4]Anderson R. J., Kuhn M. G.. Tamper resistance--a cautionary note. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, Oakland California, 1996, 1~11
5[5]Kocher P., Jaffe J., Jun B.. Differential power analysis. In: Proceedings of Advances in Cryptology-CRYPTO'99, Santa Barbara, CA, USA, 1999, 388~397
6[6]Messerges T. S., Dabbish E. A., Sloan R. H.. Investigations of power analysis attacks on smartcards. In: Proceedings of the USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, 1999, 151~161
7[7]Chari S., Jutla C., Rao J., Rohatgi P.. Towards sound approaches to counteract power-analysis attacks. In: Proceedings of Advances in Cryptology-CRYPTO'99, Santa Barbara, CA,USA,1999, 398~412
8[8]Kelsey J., Schneier B., Wagner D., Hall C.. Side channel cryptanalysis of product ciphers. In: Proceedings of, ESORICS'98, Louvain-La-Neuve, Belgium, 1998, 97~110
9[9]Messerges T. S.. Securing the AES finalists against power analysis attacks. In: Proceedings of the Fast Software Encryption Workshop 2000, New York, 2000, 150~164
10ANSI X9.32-American National Standard for Data Encryption Algorithm (DEA). AM. Standards Inst, 1981