[1] Rivest R L. The MD5 message-digest algorithm, request for comments (RFC1320)[EB/OL]. Internet Activities Board, Internet Privacy Task Force, 1992.[2] Boneh D, Demillo R A, Lipton R J. On the importance of eliminating errors in cryptographic computations [J]. Journal of Cryptology, 2001, 14(2): 101-119.[3] Balam E, Shamir A. Differential fault analysis of secret key cryptosystems [J]. Lecture Notes in Computer Science, 1997, 1294: 513-525.[4] 张蕾,吴文玲. SMS4 密码算法的差分故障攻击[J]. 计算机学报,2006, 29(9): 1596-1602. Zhang L, Wu W L. Differential fault analysis on SMS4 [J]. Chinese Journal of Computers, 2006, 29(9): 1596-1602. (in Chinese)[5] Kim C H. Differential fault analysis of AES: toward reducing number of faults [J]. Information Sciences, 2012, 199: 43-57.[6] 魏悦川,李琳,李瑞林. SHACAL-2 算法的差分故障攻击[J]. 电子与信息学报,2010, 32(2): 318-322. Wei Y C, Li L, Li R L. Differential fault analysis on SHACAL-2 [J]. Journal of Electronic and Information Technology, 2010, 32(2): 318-322. (in Chinese)[7] 张中亚,关杰. 对流密码算法LEX 的差分故障攻击[J]. 上海交通大学学报, 2012, 46(6):865-869. Zhang Z Y, Guan J. Differential fault analysis on the stream cipher LEX [J]. Journal of Shanghai Jiaotong University, 2012, 46(6): 865-869. (in Chinese)[8] Hu Y, Gao J, Liu Q. Fault analysis of trivium [J]. Designs, Codes and Cryptography(DCC), 2012, 62(3): 289-311.[9] Li R L, Li C, Gong C. Differential fault analysis on SHACAL-1 [C]//IEEE, Fault Diagnosis and Tolerance in Cryptography (FDTC) [C], Lausanne, 2009: 120-126.[10] Hemme L, Hoffmann L. Differential fault analysis on SHA-1 compression function [C]//in Fault Diagnosis and Tolerance in Cryptography (FDTC) [C], 2011 Workshop on IEEE, 2011: 54-62.[11] Li W, Tao Z, Gu D W. Differential fault analysis on the MD5 compression function [J]. Journal of Computers, 2013, 8(11): 2888-2894. |