共 11 条
- [1] Baksi A., Bhasin S., Breier J., Jap D., Saha D., A survey on fault attacks on symmetric key cryptosystems, ACM Comput. Surv, 55, 4, (2022)
- [2] Breier J., Jap D., A Survey of the State-Of-The-Art Fault Attacks, Proc. 14Th Int. Symp. Integr. Circuits (Singapore, December 10–12, 2014), pp. 152-155, (2014)
- [3] Giraud C., Thiebeauld H., A Survey on Fault Attacks, Smart Card Res. Adv. Appl. VI. IFIP 18Th World Comput. Congr. TC8/WG8.8 & TC11/WG11.2 6Th Int. Conf. (Toulouse, France, pp. 159-176, (2013)
- [4] Kim C.H., Quisquater J.-J., Faults, injection methods, and fault attacks, IEEE Des. Test Comput, 24, 6, pp. 544-545, (2007)
- [5] Gangolli A., Mahmoud Q.H., Azim A., A systematic review of fault injection attacks on IoT systems, Electronics, 11, 13, (2022)
- [6] Piscitelli R., Bhasin S., Regazzoni F., , “Fault attacks, injection techniques and tools for simulation,” in Hardware Security and Trust. Design and Deployment of Integrated Circuits in a Threatened Environment (Springer, Cham, pp. 27-47, (2017)
- [7] Shepherd C., Markantonakis K., van Heijningen N., Aboulkassimi D., Gaine C., Heckmann T., Naccache D., Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis, Comput. Secur, 111, (2021)
- [8] Bellman R., Dynamic Programming, (1957)
- [9] Dreyfus S., The Art and Theory of Dynamic Programming (Academic Press, New York, 130, (1977)
- [10] Lew A., Mauch H., Dynamic Programming: A Computational Tool, (2010)