共 73 条
[11]
Bilgin Begul, Gierlichs Benedikt, Nikova Svetla, Nikov Ventzislav, Rijmen Vincent, Higher-order threshold implementations, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8874, pp. 326-343, (2014)
[12]
Bos Joppe W., Gourjon Marc, Renes Joost, Schneider Tobias, van Vredendaal Christine, Masking kyber: First-and higher-order implementations, IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 4, pp. 173-214, (2021)
[13]
Becker Anja, Joux Antoine, May Alexander, Meurer Alexander, Decoding random binary linear codes in 2<sup>n/20</sup>: How 1 + 1 = 0 improves information set decoding, Advances in Cryptology – EUROCRYPT 2012, volume 7237 of Lecture Notes in Computer Science, pp. 520-536, (2012)
[14]
Chen Ming-Shing, Chou Tung, Classic mceliece on the ARM cortex-M4, IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 3, pp. 125-148, (2021)
[15]
Cayrel Pierre-Louis, Colombier Brice, Dragoi Vlad-Florin, Menu Alexandre, Bossuet Lilian, Message-recovery laser fault injection attack on the classic McEliece cryptosystem, Advances in Cryptology – EUROCRYPT 2021, Part II, volume 12697 of Lecture Notes in Computer Science, pp. 438-467, (2021)
[16]
Colombier Brice, Dragoi Vlad-Florin, Cayrel Pierre-Louis, Grosso Vincent, Message-recovery profiled side-channel attack on the classic mceliece cryptosystem, Cryptology ePrint Archive, (2022)
[17]
Chen Cong, Danba Oussama, Hoffstein Jeffrey, Hulsing Andreas, Ri-jneveld Joost, Schanck John M., Schwabe Peter, Whyte William, Zhang Zhenfei, Saito Tsunekazu, Yamakawa Takashi, Xagawa Keita, NTRU, (2020)
[18]
Cagli Eleonora, Dumas Cecile, Prouff Emmanuel, Convolutional neural networks with data augmentation against jitter-based countermeasures-profiling attacks without pre-processing, Cryptographic Hardware and Embedded Systems – CHES 2017, volume 10529 of Lecture Notes in Computer Science, pp. 45-68, (2017)
[19]
Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template attacks, Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 13-28, (2003)
[20]
D'Anvers Jan-Pieter, Karmakar Angshuman, Roy Sujoy Sinha, Vercauteren Frederik, Mera Jose Maria Bermudo, Van Beirendonck Michiel, Basso Andrea, SABER, (2020)