共 10 条
[1]
Batina L, 2012, LECT NOTES COMPUT SC, V7178, P383, DOI 10.1007/978-3-642-27954-6_24
[2]
Efficient Side-Channel Attack through Balanced Labels Compression and Variational Autoencoder
[J].
2023 19TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN 2023,
2023,
:480-487
[3]
[谷大武 Gu Dawu], 2021, [西安电子科技大学学报, Journal of Xidian University], V48, P14
[4]
Hu F, 2023, IEEE Transactions on Information Forensics and Security, P19
[5]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[6]
KWON D, 2020, IACR Cryptology ePrint Archive, p2020/396
[7]
Oswald M., 2007, Power Analysis Attacks: Revealing the Secrets of Smart Cards, DOI [10.1007/978-0-387-38162-6, DOI 10.1007/978-0-387-38162-6]
[8]
Picek S., 2020, CHES, P389
[9]
Tiri K, 2005, LECT NOTES COMPUT SC, V3659, P354
[10]
XIAO Chong, 2024, Chinese Journal of Computers, P1