共 23 条
- [1] Athreya K.B., Lahiri S.N., Measure theory and probability theory, (2006)
- [2] Bhasin Shivam, Danger Jean-Luc, Guilley Sylvain, Najm Zakaria, Side-channel leakage and trace compression using normalized inter-class variance, Cryptology ePrint Archive, (2014)
- [3] Benadjila Ryad, Prouff Emmanuel, Strullu Remi, Cagli Eleonora, Dumas Cecile, Deep learning for side-channel analysis and introduction to ASCAD database, Journal of Cryptographic Engineering, 10, 2, pp. 163-188, (2020)
- [4] Cooper J., de Mulder E., Goodwill G., Jaffe J., Kenworthy G., Test vector leakage assessment (TVLA) methodology in practice (extended abstract), ICMC, (2013)
- [5] Cagli Eleonora, Dumas Cecile, Prouff Emmanuel, Convolutional neural networks with data augmentation against jitter-based countermeasures – profiling attacks without pre-processing, Cryptology ePrint Archive, (2017)
- [6] Choudary Omar, Kuhn Markus G., Template attacks on different devices, Cryptology ePrint Archive, (2014)
- [7] Cristiani Valence, Lecomte Maxime, Maurine Philippe, Leakage assessment through neural estimation of the mutual information, Applied Cryptography and Network Security Workshops: ACNS 2020 Satel lite Work-shops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings 18, pp. 144-162, (2020)
- [8] Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template attacks, CHES 2002, volume 2523 of LNCS, pp. 13-28, (2003)
- [9] de Cherisey Eloi, Guilley Sylvain, Rioul Olivier, Piantanida Pablo, Best information is most successful, Cryptology ePrint Archive, (2019)
- [10] Durvaux Francois, Standaert Francois-Xavier, From improved leakage detection to the detection of points of interests in leakage traces, EUROCRYPT 2016, Part I, volume 9665 of LNCS, pp. 240-262, (2016)