共 50 条
[21]
Some active attacks on fast server-aided secret computation protocols for modular exponentiation
[J].
CRYPTOGRAPHY: POLICY AND ALGORITHMS,
1996, 1029
:215-227
[22]
Simple Power Analysis on Exponentiation Revisited
[J].
SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS,
2010, 6035
:65-+
[23]
Power Analysis Attacks Against IEEE 802.15.4 Nodes
[J].
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2016,
2016, 9689
:55-70
[24]
SEED Masking Implementations against Power Analysis Attacks
[J].
PROCEEDINGS OF THE 2010 IEEE ASIA PACIFIC CONFERENCE ON CIRCUIT AND SYSTEM (APCCAS),
2010,
:1199-1202
[25]
Power Side Channel Analysis and Anomaly Detection of Modular Exponentiation Method in Digital Signature Algorithm Based Fpga
[J].
THIRD INTERNATIONAL CONFERENCE ON COMPUTATIONAL MATHEMATICS AND ENGINEERING SCIENCES (CMES2018),
2018, 22
[26]
Experiments on Two Clock Countermeasures Against Power Analysis Attacks
[J].
2014 PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON MIXED DESIGN OF INTEGRATED CIRCUITS & SYSTEMS (MIXDES),
2014,
:215-219
[27]
Random Interleaved Pipeline Countermeasure Against Power Analysis Attacks
[J].
2013 9TH CONFERENCE ON PH. D. RESEARCH IN MICROELECTRONICS AND ELECTRONICS (PRIME 2013),
2013,
:145-148
[28]
Scrambler Based AES for Countermeasure Against Power Analysis Attacks
[J].
ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING,
2020, 590
:152-157
[29]
Randomized scalar multiplication algorithm against power analysis attacks
[J].
Liu, Hongming,
1600, Binary Information Press (10)
:7787-7796
[30]
Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm
[J].
Journal of Cryptographic Engineering,
2021, 11
:369-397