2Mao W, Gulai R K. QUIETEST: A Methodology for Selecting IDDQ Test Vectors [J] . JETTA, 1992, (12): 349-359.
3Soden J M. IDDQ Testing: A Reviews [J] . JETTA,1992, (12): 291-304.
4Baker F, Bratt A, Richadson A, et al. Development of a Class I QTAG Moniter [A] . International Test Conference[C]. 1994. 213-222.
5[1]Kocher P,Jaffe J,Jun B.Differential power analysis.In:Proceeding of the Advances in Cryptography (CRYPTO'99),Santa Barbara,USA,1999
6[2]Messerges T S,Dabbish E A,Sloan R H,Investigations of power analysis attacks on smartcards.Proceedings of USENIX Workshop on Smartcard Technology,May 1999
7[3]Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model.In:eds Joye M,Quisquater J J.Cryptographic Hardware Embedded System-CHES 2004.USA,Volume 3156 of Lecture Notes in Computer Science,Springer-Verlag,2004
8[4]Messerges T S,Dabbish E A,Sloan R H.Examining smartcard secu rity under the threat of power analysis attacks.IEEE Transactions on Computers,2002
9Kocher P,Jatte J,Jun B.Differential power analysis[A].Wiener M,editor.Advances in Cryptology:Proceedings of CRYPTO' 99[C].Volume 1666 in Lecture Notes in Computer Science,Santa Barbara,CA,USA,Springer-Verlag 1999,388-397.
10Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[A].Joye M,Quisquater J J,editor.Cryptographic Hardware Embedded System-CHES 2004[C].USA,Volume 3156 of Lecture Notes in Computer Science,Springer-Verlag,2004,16-29.