共 30 条
[1]
Acharya RY, 2021, Arxiv, DOI arXiv:2105.00117
[2]
[Anonymous], 2016, CAESAR Competit.
[3]
Bertoni G., 2011, Revised Selected Papers, V18, P320
[4]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[5]
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:45-68
[6]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[7]
Gierlichs B, 2008, LECT NOTES COMPUT SC, V5154, P426
[8]
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
[9]
Gross H., 2018, TCHES, V2018, P1, DOI [DOI 10.13154/TCHES.V2018.I2.1-21, 10.13154/tches.v2018.i2.1-21]
[10]
Kim J., 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems, V2019, DOI [DOI 10.13154/TCHES.V2019.I3.148-179, 10.13154/tches.v2019.i3.148-179, DOI 10.46586/TCHES.V2019.I3.148-179]