共 14 条
[1]
Schneider TOBIAS, Moradi AMIR, Leakage assessment methodology-a clear roadmap for side-channel evaluations
[2]
MATHER L, OSWALD E, BANDENBURG J, Et al., Does my device leak lnformation?an a priori statistical power analysis of leakage detection tests, Part I of the International Conference on Advances in Cryptology-asiacrypt, (2013)
[3]
SCHNEIDER T, MORADI A., Leakage assessment methodology, Cryptographic Hardware and Embedded Systems, (2015)
[4]
SIEBERT M, ELLENBERGER D., Validation of automatic passenger counting: introducing the t-test-induced equivalence test, Transportation, 4, pp. 1-15, (2019)
[5]
ZHANG S, ZHONG W., A new type of countermeasure against DPA in multi-sbox of block cipher, Wireless Communications and Mobile Computing, 2018, pp. 1-11, (2018)
[6]
GAO P, XIE H, ZHANG J, Et al., Quantitative verification of masked arithmetic programs against side-channel attacks, International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 6-11, (2019)
[7]
YAN Yingjian, WANG Shoucheng, XU Jinhui, Research on parallel processing model of block cipher based on Amdahl's law, Transactions of Beijing Institute of Technology, 38, 9, pp. 101-108, (2018)
[8]
SIEBERT M, ELLENBERGER D., Leakage assessment methodology, Cryptographic Hardware and Embedded System, (2015)
[9]
LIU Jiayong, Applied cryptography, (2008)
[10]
YANG Zhiyao, ZHUO Zepeng, CHONG Jinfeng, Correlation analysis of a class of generalized boolean functions, Journal of Huaibei Normal University (Natural Science Edition), 2, pp. 1-3, (2019)