共 24 条
[1]
Biham E., Shamir A., Differential fault analysis of secret key cryptosystems, LNCS, 1294, pp. 513-525, (1997)
[2]
Bishop C.M., Pattern Recognition and Machine Learning (Information Science and Statistics), (2006)
[3]
Chari S., Rao J.R., Rohatgi P., Template attacks, LNCS, 2523, pp. 13-28, (2003)
[4]
Clavier C., Side channel analysis for reverse engineering (Scare) - An improved attack against a secret a3/a8 gsm algorithm, Cryptology EPrint Archive, Report 2004/049, (2004)
[5]
Durbin R., Eddy S., Krogh A., Mitchison G., Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids, (1998)
[6]
Fink G.A., Markov Models for Pattern Recognition, (2008)
[7]
Goldack M., Side-Channel Based Reverse Engineering for Microcontrollers, (2008)
[8]
Igel C., Glasmachers T., Heidrich-Meisner V., Shark, Journal of Machine Learning Research, 9, pp. 993-996, (2008)
[9]
Kocher P.C., Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems, LNCS, 1109, pp. 104-113, (1996)
[10]
Kocher P.C., Jaffe J., Jun B., Differential power analysis, LNCS, 1666, pp. 388-397, (1999)