期刊文献+

功耗分析攻击中滤噪方法的研究

Research on Filtering Noise Method of the Power Analysis Attack
下载PDF
导出
摘要 在真实环境的功耗分析攻击中发现,功耗曲线经常受到大量噪声的影响.为了提高攻击效率,分析了几种常用滤波方法的特点,针对具体的功耗分析问题在真实环境下进行了实验.对几种滤波效果进行了对比,得出滑动平均滤波最适合解决此类问题的结论. The power consumption curves were often affected by plenty of noise in real environment attack. In order to improve the efficiency of the attack, this paper analyses characteristics of several common filtering noise methods and completes experiments to the specific questions. At last, it compares the filtering effects and draws a conclusion that moving average filter is the most suitable method to solve this kind of problem.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第8期107-110,114,共5页 Microelectronics & Computer
基金 国家自然科学基金资助项目(60873216) 四川省科技攻关重点项目(2012GZ0017) 四川省应用基础研究基金资助项目(2011JY0100)
关键词 密码分析 边信道攻击 功耗分析攻击 滤噪算法 cryptanalysis side channel attack power consumption analysis attack filterring noise algorithm
  • 相关文献

参考文献11

  • 1Kocher P,Jaffe J, Jun B. Differential power analysis [-J. CRYTO 1999, Lecture Notes in Computer- Science, 1999(1666) : 388-397.
  • 2Messetges T S, Dabbish E A, Sloan R H. Investigations of power analysis attacks on smartcardsEC//Proc USENIX Workshop Smartcard Technology Chicago, Illinois, USA: IEEE, 1999 : 151-161.
  • 3Rao J R , Rohatgi P. EMpowering side-channel attacks [R]. preliminaryteehnical report, IBM T. J. Watson Research Center, 2001.
  • 4Biham E, Shamir A. Differential fault analysis of se- cret keycryptosystems[-C]//Proc of Crypto 97. Santa Barbara, California,USA: [-s. m ], 1997.
  • 5Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power analysis attacks revealing the secrets of smart cards advances in information security [M]. New York,. SDriner, 2007.
  • 6胡建建,曾培峰,唐莉萍,臧珠萍.基于高斯低通滤波的音乐节拍提取[J].东华大学学报(自然科学版),2011,37(1):72-75. 被引量:5
  • 7何岭松,王峻峰.巴特沃斯小波变换算法在故障诊断中的应用[J].华东理工大学学报,2000,28(10):31-33.
  • 8James H Mc Clellan,Ronald WSchafer,Mark AYo-der.信号处理引论[M].北京:电子工业出版社,2005.
  • 9戴永寿,牛慧,彭星,王少水.基于自回归滑动平均模型和粒子群算法的地震子波提取[J].中国石油大学学报(自然科学版),2011,35(3):47-50. 被引量:7
  • 10孙敦灿,陈运,万武南,索望.功耗分析平台中混合编程的应用研究[J].成都信息工程学院学报,2011,26(2):127-131. 被引量:3

二级参考文献35

  • 1廖云伢,王建新,盛羽.基于Java与Matlab集成的虚拟实验平台的设计与实现[J].计算机应用,2007,27(2):394-396. 被引量:16
  • 2师学明,王家映,易远元,苑新喜,王晓明,张云姝.一种新的地球物理反演方法——模拟原子跃迁反演法[J].地球物理学报,2007,50(1):305-312. 被引量:25
  • 3张涛,范明钰,王光卫,鲁晓军.Smartcard上椭圆曲线密码算法的能量攻击和防御[J].计算机工程,2007,33(14):125-127. 被引量:10
  • 4KOCHERP,JAFFE J,JUN B.Differential Power Analysis[C].Proceedings of Advances in CRYPTO'99.LNCS 1666.Springer-Verlag,Berlin Heidelberg,1999:388-397.
  • 5CORON J S.Resistance against differential power analysis for Elliptic curve eryptosystems[C].Cryptographic Hardware and Embedded Systems(CHES'99),LNCS 1717.Springer-Verlag,Berlin,1999:292-302.
  • 6GOBIN L.A Refined Power Analysis Attack on Elliptic Curve Cryptosystems[C].Public Key Cryptography2003,LNCS 2567.Springer-Verlag,Berlin Heidelberg,2003.
  • 7AKISHITA T,TAKAGI T.Zero-Value Point Attacks on Elliptic Curve Cryptosystem[EB/OL].http://www.informatik,tu-darmstadt.de/ftp/pub/TI/TR/TI-03-01.zvp.ps.
  • 8MAMIYA H,MIYAJI A,MORIMOTO H.Efficient Countermeasures against RPA,DPA,and SPA[C].Cryptographic Hardware and Embedded Systems(CHES' 04),LNCS 3156,Springer-Verlag,2004:343-356.
  • 9FENG M,ZHU B B.Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis[EB/OL].http://eprint.iacr.org/2005/222.ps.gz.
  • 10张焕国译.椭圆曲线密码学导引[M].北京:电子工业出版社,2005.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部