[1]eSTREAMECRYPT stream cipher project[OL]. [20160120]. http:www.ecrypt.eu.orgstream[2]Hoch J J, Shamir A. Fault analysis of stream ciphers[G] LNCS 3156: Proc of CHES 2004. Berlin: Springer, 2004: 120[3]Hojsk M, Rudolf B. Differential fault analysis of trivium[G] LNCS 5086: Proc of FSE 2008. Berlin: Springer, 2008: 158172[4]Kircanski A, Youssef A M. Differential fault analysis of rabbit[G] LNCS 5867: Proc of SAC 2009. Berlin: Springer, 2009: 197214[5]Skorobogatov S P. Optically enhanced positionlocked power analysis[G] LNCS 4249: Proc of CHES 2006. Berlin: Springer, 2006: 6175[6]Biham E, Shamir A. Differential fault analysis of secret key cryptosystems[G] LNCS 1294: Proc of CRYPTO 1997. Berlin: Springer, 1997: 513525[7]Blomer J, Seifert J. Fault based cryptanalysis of the advanced encryption standard (AES)[G] LNCS 2742: Proc of FC 2003. Berlin: Springer, 2003: 162181[8]Skorobogatov S P. Optically enhanced positionlocked power analysis[G] LNCS 4249: Proc of CHES 2006. Berlin: Springer, 2006: 6175[9]Skorobogatov S P, Anderson R J. Optical fault induction attacks[G] LNCS 2523: Proc of CHES 2002. Berlin: Springer, 2003: 212[10]Babbage S, Canniere C D, Canteaut A, et al. The eStream Portfolio[OL]. [20160120]. http:www.ecrypt.eu.orgstreamportfolio.pdf[11]Dinur I, Shamir A. Breaking Grain128 with dynamic cube attacks[G] LNCS 6733: Proc of FSE 2003. Berlin: Springer, 2003: 162181[12]Berzati A, Canovas C, Castagnos G, et al. Fault analysis of Grain128[C] Proc of IEEE Int Workshop on HardwareOriented Security and Trust. Piscataway, NJ: IEEE, 2009: 714[13]Nitaj A, Pointcheval D. Fault analysis of Grain128 by targeting NFSR[G]. LNCS 6737: Proc of AFRICACRYPT 2011. Berlin: Springer, 2011: 298315汤永利