[1] Biryukov A, Shamir A. Structural cryptanalysis of SASAS[C]//International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg:Springer, 2001:395-405. [2] Torrance R, James D. The state-of-the-art in IC reverse engineering[C]//International Workshop on Cryptographic Hardware and Embedded Systems. Heidelberg:Springer, 2009:363-381. [3] Clavier C, Wurcker A. Reverse engineering of a secret AES-like cipher by ineffective fault analysis[C]//2013 Workshop on Fault Diagnosis and Tolerance in Cryptography. Piscataway:IEEE, 2013:119-128. [4] Daudigny R, Ledig H, Muller F, et al. SCARE of the DES[C]//International Conference on Applied Cryptography and Network Security. Heidelberg:Springer, 2005:393-406. [5] Novak R. Side-channel based reverse engineering of secret algorithms[C]//Proceedings of the 12th International Electro Technical and Computer Science Conference. Piscataway:IEEE, 2003:445-448. [6] Rivain M, Roche T. SCARE of secret ciphers with SPN structures[C]//International Conference on the Theory and Application of Cryptology and Information Security. Heidelberg:Springer, 2013:526-544. [7] Biryukov A, Perrin L. On reverse-engineering S-boxes with hidden design criteria or structure[C]//Annual Cryptology Conference. Heidelberg:Springer, 2015:116-140. [8] Gao Si, Chen Hua, Wu Wenling, et al. My traces learn what you did in the dark:recovering secret signals without key guesses[C]//Cryptographers' Track at the RSA Conference.[S.l.]:Springer, 2017:363-378. [9] 马向亮, 李冰, 习伟, 等. 基于独立分量技术的类GIFT算法S盒逆向分析[J]. 计算机研究与发展, 2018, 55(10):2269-2277. Ma Xiangliang, Li Bing, Xi Wei, et al. Reverse-analysis of S-box for GIFT-like algorithms based on independent component analysis technology[J]. Journal of Computer Research and Development, 2018, 55(10):2269-2277. [10] Timon B. Non-profiled deep learning-based side-channel attacks with sensitivity analysis[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019(2), 107-131. [11] 张蕾, 吴文玲. SMS4密码算法的差分故障攻击[J]. 计算机学报, 2006, 29(9):1596-1602. Zhang Lei, Wu Wenling. Differential fault analysis on SMS4[J]. Chinese Journal of Computers, 2006, 29(9):1596-1602. [12] 马向亮, 王宏, 李冰, 等. 基于能量分析技术的芯片后门指令分析方法[J]. 电子学报, 2019, 47(3):686-691. Ma Xiangliang, Wang Hong, Li Bing, et al. A power analysis method against backdoor instruction in chips[J]. Acta Electronica Sinica, 2019, 47(3):686-691. [13] Maghrebi H, Portigliatti T, Prouff E. Breaking cryptographic implementations using deep learning techniques[C]//International Conference on Security, Privacy, and Applied Cryptography Engineering.[S.l.]:Springer, 2016:3-26. |