共 16 条
[1]
Kocher P.C., Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Lecture Notes in Computer Science: 1109, pp. 104-113, (1996)
[2]
Schindler W., Exclusive Exponent Blinding Is Not Enough to Prevent Any Timing Attack on RSA, Journal of Cryptographic Engineering, 6, 2, pp. 101-119, (2016)
[3]
Brumley D., Boneh D., Remote Timing Attacks Are Practical, Computer Networks, 48, 5, pp. 701-716, (2005)
[4]
Cui X., Yang J., Ye H., Et al., Optimized Design Method on Elliptic Curve Cryptography, Journal of Xidian University, 42, 1, pp. 69-74, (2015)
[5]
Waugh R., Could a Vulnerable Computer Chip Allow Hackers to Down a Boeing 787? `Back Door' Could Allow Cyber-criminals a Way in
[6]
Adee S., The Hunt for the Kill Switch, IEEE Spectrum, 45, 5, pp. 34-39, (2008)
[7]
Hu W., Mao B., Oberg J., Et al., Detecting Hardware Trojans with Gate-level Information-flow Tracking, Computer, 49, 8, pp. 44-52, (2016)
[8]
Zhang G., Liu Q., Zhang Q., Low Cost and High Performance RO-PUF Design for IP Protection of FPGA Implementations, Journal of Xidian University, 43, 6, pp. 97-102, (2016)
[9]
Oberg J., Meiklejohn S., Sherwood T., Et al., Leveraging Gate-level Properties to Identify Hardware Timing Channels, IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, 33, 9, pp. 1288-1301, (2014)
[10]
Mu D.J., Hu W., Mao B.L., Et al., A Bottom-up Approach to Verifiable Embedded System Information Flow Security, IET Information Security, 8, 1, pp. 12-17, (2014)