LI Zhiming, TANG Yongzhong. Template Attack of AES Algorithm Based on Euclidean Distance[J]. Computer Engineering and Applications, 2022, 58(2): 110-115.
[1] LIPP M,SCHWARZ M,GRUSS D,et al.Meltdown[EB/OL].[2021-04-05].https://meltdownattack.com/meltdown.pdf.
[2] KOCHER P,HORN J,FOGH A,et al.Spectre attacks:exploiting speculative execution[J].Communications of the ACM,2020,63(7):93-101.
[3] SCHWARZL M,SCHUSTER T,SCHWARZ M,et al.Speculative dereferencing of registers:reviving foreshadow[J].arXiv:2008.02307,2020.
[4] YAROM Y,FALKNER K.FLUSH+RELOAD:a high resolution,low noise,L3 cache side-channel attack[C]//Proceedings of USENIX Security Symposium,2014:719-732.
[5] MARTIN D P,O’CONNELL J F,OSWALD E,et al.Counting keys in parallel after a side channel attack[C]//Proceedings of Advances in Cryptology,2015:313-337.
[6] 崔国华,唐国富,洪帆.AES算法的实现研究[J].计算机应用研究,2004,21(8):99-101.
CUI G H,TANG G F,HONG F.Research of AES’s implementation technique[J].Application Research of Computers,2004,21(8):99-101.
[7] CHEN C S,WANG T,KOU Y Z,et al.Improvement of trace-driven I-Cache timing attack on the RSA algorithm[J].The Journal of Systems and Software,2013,86(1):100-107.
[8] MOGHIMI A,IRAZOQUI G,EISENBARTH T.CacheZoom:how SGX amplifies the power of cache attacks[C]//Proceeding of Cryptographic Hardware and Embedded Systems,2017:69-90.
[9] SCHWARZ M,CANELLA C,GINER L,et al.Store-to-leak forwarding:leaking data on meltdown-resistant CPUs[J].arXiv:1905.05725,2019.
[10] SCHWARZ M,LIPP M,MOGHIMI D,et al.ZombieLoad:cross-privilege-boundary data sampling[C]//Proceedings of ACM SIGSAC Conference on Computer and Communications Security,2019:753-768.
[11] 樊昊鹏,袁庆军,王向宇,等.针对AES-128算法的密钥优势模板攻击[J].电子学报,2020,48(10):2003-2008.
FAN H P,YUAN Q J,WANG X Y,et al.Key advantage template attack against AES-128 algorithm[J].Acta Electronica Sinica,2020,48(10):2003-2008.
[12] LUO Y L.Cryptanalysis of a chaotic block cryptographic system against template attacks[J].International Journal of Bifurcation and Chaos,2020,30(15):205-223.
[13] STALLINGS W,彭蔓蔓,吴强.计算机组成与体系结构性能设计[M].北京:机械工业出版社,2011.
STALLINGS W,PENG M M,WU Q.Computer composition and architecture performance design[M].Beijing:China Machine Press,2011.
[14] CHRISTOF P,JAN P.深入浅出密码学[M].马小婷,译.北京:清华大学出版社,2012.
CHRISTOF P,JAN P.Introducing cryptography in simple language[M].Beijing:Tsinghua University Press,2012.
[15] 道格拉斯.密码学原理与实践[M].冯登国,译.北京:电子工业出版社,2016.
DOUGLAS R S.Principles and practice of cryptography[M].Beijing:Publishing House of Electronics Industry,2016.
[16] 赵新杰,王韬,郭世泽,等.AES访问驱动Cache计时攻击[J].软件学报,2011,22(3):572-591.
ZHAO X J,WANG T,GUO S Z,et al.Access driven Cache timing attack against AES[J].Journal of Software,2011,22(3):572-591.
[17] APECECHEA G I,INCI M S,EISENBARTH T,et al.Fine grain cross-VM attacks on Xen and VMware[C]//Proceedings of IEEE Fourth International Conference on Big Data and Cloud Computing,2014:737-744.