共 64 条
- [1] Agrawal Dakshi, Archambeault Bruce, Rao Josyula R., Rohatgi Pankaj, The EM Side—Channel(s), Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 29-45, (2003)
- [2] Araujo Andre, Norris Wade, Sim Jack, Computing Re-ceptive Fields of Convolutional Neural Networks, Distil l, (2019)
- [3] Bach Sebastian, Binder Alexander, Montavon Gregoire, Klauschen Frederick, Muller Klaus-Robert, Samek Wojciech, On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation, PloS one, 10, 7, (2015)
- [4] Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems-CHES 2004, pp. 16-29, (2004)
- [5] Blake Archie, Corrections to Canonical expressions in Boolean algebra, Journal of Symbolic Logic, 3, 2, pp. 112-113, (1938)
- [6] Bartkewitz Timo, Lemke-Rust Kerstin, Efficient template attacks based on probabilistic multi-class support vector machines, International Conference on Smart Card Research and Advanced Applications, pp. 263-276, (2012)
- [7] Benamira Adrien, Peyrin Thomas, Kuen-Yew Bryan Hooi, Truth-table net: A new convolutional architecture encodable by design into sat formulas, (2022)
- [8] Benadjila Ryad, Prouff Emmanuel, Strullu Remi, Cagli Eleonora, Dumas Cecile, Deep learning for side-channel analysis and introduction to ASCAD database, J. Cryptogr. Eng, 10, 2, pp. 163-188, (2020)
- [9] Bracewell R.N., The Fourier Transform and its Applications, (1978)
- [10] Cagli Eleonora, Dumas Cecile, Prouff Emmanuel, Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures, Cryptographic Hardware and Embedded Systems – CHES 2017, pp. 45-68, (2017)