[1]Biryukov A. The design of a stream cipher LEX [C]∥Biham E, Youssef A M. Selected Areas in Cryptography.Berlin Heidelberg:Springer Verlag, 2007:6775.[2]Wu H, Preneel B. Resynchronization attacks on WG and LEX [J]. Lecture Notes in Computer Science,2006,4047:422432.[3]Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for faults [J]. Lecture Notes in Computer Science, 1997, 1233:3751.[4]Biham E, Shamir A. Differential fault analysis of secret key cryptosystems [J]. Lecture Notes in Computer Science, 1994,1294: 513525. [5]Giraud C. DFA on AES [J]. Lecture Notes in Computer Science, 2005, 3373: 2741.[6]Hemme L. A differential fault attack against early rounds of (Triple) DES [J]. Lecture Notes in Computer Science, 2004,3156: 254267.[7]李琳,李瑞林,谢端强,等. KeeLoq和SHACAL1算法的差分故障攻击 [J]. 武汉大学学报(理学版), 2008,54(5): 507512.LI Lin, LI Ruilin, XIE Duanqiang, et al. Differential fault analysis on KeeLoq and SHACAL1 [J]. Journal of Wuhan University(Natural Science Edition), 2008, 54(5): 507512.[8]魏悦川,李琳,李瑞林,等. SHACAL2算法的差分故障攻击 [J].电子与信息学报, 2010, 32(2): 318322.WEI Yuechuan, LI Lin, LI Ruilin, et al. Differential fault analysis on SHACAL2 [J]. Journal of Electronics & Information Technology, 2010, 32(2): 318322.[9]Hojsik M, Rudolf B. Differential fault analysis of Trvium [C]∥Fast Software Encryption.Berlin:Springer Verlag, 2008: 158172.[10]张蕾,吴文玲. SMS4密码算法的差分故障攻击 [J]. 计算机学报, 2006, 29(9): 15961602.ZHANG Lei, WU Wenling. Differential fault analysis on SMS4 [J]. Chinese Journal of Computers, 2006, 29(9): 15961602.[11]李玮, 谷大武. 基于密钥编排故障的SMS4算法的差分故障分析 [J]. 通信学报, 2008, 29(10): 135142.LI Wei, GU Dawu. Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule [J]. Journal on Communications, 2008, 29(10): 135142.[12]Skorobogatov S, Anderson R. Optical fault induction attacks [J]. Lecture Notes in Computer Science,2003, 2523: 212. |