|
Journal of Computer Science and Technology ›› 2019, Vol. 34 ›› Issue (5): 1079-1095.doi: 10.1007/s11390-019-1961-5
Special Issue: Computer Networks and Distributed Computing
• Computer Networks and Distributed Computing • Previous Articles Next Articles
Chi Zhang1, Jun-Rong Liu1,2, Da-Wu Gu1,*, Distinguished Member, CCF, Member, ACM, Wei-Jia Wang3, Xiang-Jun Lu1, Zheng Guo1,2, Hai-Ning Lu1,4
[1] Shankar P M. Introduction to Wireless Systems. Wiley, 2002. [2] Sauter M. From GSM to LTE:An Introduction to Mobile Networks and Mobile Broadband (1st edition). Wiley, 2011. [3] Bertoni G, Daemen J, Peeters M, van Assche G. Keccak. In Proc. the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2013, pp.313-314. [4] Steele R, Lee C C, Gould P. GSM, cdmaOne and 3G Systems (1st edition). Wiley, 2001. [5] Mangard S, Oswald E, Popp T. Power Analysis Attacks:Revealing the Secrets of Smart Cards. Springer, 2007. [6] Rao J R, Rohatgi P, Scherzer H, Tinguely S. Partitioning attacks:Or how to rapidly clone some GSM cards. In Proc. the 2002 IEEE Symposium on Security and Privacy, May 2002, pp.31-41. [7] Zhou Y, Yu Y, Standaert F X, Quisquater J J. On the need of physical security for small embedded devices:A case study with COMP128-1 implementations in SIM cards. In Proc. the 17th International Conference on Financial Cryptography and Data Security, April 2013, pp.230-238. [8] Liu J, Yu Y, Standaert F X, Guo Z, Gu D, Sun W, Ge Y, Xie X. Small tweaks do not help:Differential power analysis of MILENAGE implementations in 3G/4G USIM cards. In Proc. the 20th European Symposium on Research in Computer Security, September 2015, pp.468-480. [9] Maghrebi H, Bringer J. Side-channel analysis of the TUAK algorithm used for authentication and key agreement in 3G/4G networks. In Proc. the 15th International Conference on Smart Card Research and Advanced Applications, November 2016, pp.39-56. [10] Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In Proc. the 6th International Workshop on Cryptographic Hardware and Embedded Systems, August 2004, pp.16-29. [11] Kocher P, Jaffe J, Jun B. Differential power analysis. In Proc. the 19th Annual International Cryptology Conference, August 1999, pp.388-397. |
[1] | Kai-Le Su, Qing-Liang Chen, Abdul Sattar, Wei-Ya Yue, Guan-Feng Lv, and Xi-Zhong Zheng. Verification of Authentication Protocols for Epistemic Goals via SAT Compilation [J]. , 2006, 21(6): 932-943 . |
[2] | Rui Xue and Deng-Guo Feng. New Semantic Model for Authentication Protocols in ASMs [J]. , 2004, 19(4): 0-0. |
|
|