6Koeher P C. Timing Attacks on Implementations of Diffie-Hellman,RSA, DSS, and Other Systems[C]//Koblitz N, ed. Advances in Cryptology-CRYPTO ' 96, 16th Annual International Cfyptology Conference. Santa Barbara, California, USA, August 1996 : 18-22.
7Boneh D, DeMiUo R, Lipton R. On the importance of checking cryptographic protocols for faults[J]. Cryptol, 2001,14(2) : 101-119.
8Skorobogatov S P. Semi-invasive attacks-A new approach to hardware security analysis[R]. Computer laboratory, University of Cambridge, 2005.
9Bar-El H, Choukri H, Naccache D, et al. The Sorcerer's Apprentice Guide to Fault Attacks[J]. Proceedings of the IEEE, 2006,92(2):370-382.
10Boneh D, DeMillo R A, Lipton R J. On the importance of eliminating errors in cryptographie computations [J]. Journal of Cryptology, 2001,1442) : 101-119.