共 84 条
[1]
Abromeit Arnold, Bache Florian, Becker Leon A, Gourjon Marc, Guneysu Tim, Jorn Sabrina, Moradi Amir, Orlt Maximilian, Schel-lenberg Falk, Automated masking of software implementations on industrial microcontrollers, 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1006-1011, (2021)
[2]
Agosta Giovanni, Barenghi Alessandro, Pelosi Gerardo, Compiler-based techniques to secure cryptographic embedded software against side-channel attacks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39, 8, pp. 1550-1554, (2019)
[3]
AgentANAKIN. Grover’s Algorithm, (2019)
[4]
(2023)
[5]
Ash-Saki Abdullah, Alam Mahabubul, Ghosh Swaroop, Analysis of crosstalk in nisq devices and security implications in multi-programming regime, Proceedings of the ACM/IEEE International Symposium on Low Power Electronics and Design, pp. 25-30, (2020)
[6]
Balas Egon, Disjunctive programming, Annals of discrete mathematics, 5, pp. 3-51, (1979)
[7]
Barbosa Haniel, Barrett Clark W., Brain Martin, Kremer Gereon, Lachnitt Hanna, Mann Makai, Mohamed Abdalrhman, Mohamed Mudathir, Niemetz Aina, Notzli Andres, Ozdemir Alex, Preiner Mathias, Reynolds Andrew, Sheng Ying, Tinelli Cesare, Zohar Yoni, cvc5: A versatile and industrial-strength SMT solver, Tools and Algorithms for the Construction and Analysis of Systems-28th International Conference, TACAS 2022, volume 13243 of Lecture Notes in Computer Science, pp. 415-442, (2022)
[8]
Belleville Nicolas, Courousse Damien, Heydemann Karine, Charles Henri-Pierre, Automated software protection for the masses against side-channel attacks, ACM Transactions on Architecture and Code Optimization (TACO), 15, 4, pp. 1-27, (2018)
[9]
Belaid Sonia, Dagand Pierre-Evariste, Mercadier Darius, Rivain Matthieu, Wintersdorff Raphael, Tornado: Automatic generation of probing-secure masked bitsliced implementations, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 311-341, (2020)
[10]
Branciard Cyril, Gisin Nicolas, Kraus Barbara, Scarani Valerio, Security of two quantum cryptography protocols using the same four qubit states, Physical Review A, 72, 3, (2005)