共 33 条
[3]
Bhasin S, 2014, LECT NOTES COMPUT SC, V8804, P201, DOI 10.1007/978-3-319-12060-7_14
[5]
Coron Jean-Sebastien, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P69, DOI 10.1007/978-3-642-29912-4_6
[7]
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE
[J].
SELECTED AREAS IN CRYPTOGRAPHY,
2021, 12804
:593-614
[8]
Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III,
2022, 13277
:284-311
[9]
Hettwer B., 2020, P 57 ACM IEEE DES AU, P1
[10]
Heuser A, 2012, LECT NOTES COMPUT SC, V7178, P365, DOI 10.1007/978-3-642-27954-6_23