共 28 条
[1]
Akkar M.-L., 2001, IMPLEMENTATION AES S, P309
[2]
[Anonymous], 2021, 180333 ISO IEC
[3]
Bilgin B, 2014, LECT NOTES COMPUT SC, V8874, P326, DOI 10.1007/978-3-662-45608-8_18
[4]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[5]
Canright D, 2005, LECT NOTES COMPUT SC, V3659, P441
[6]
Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:137-153
[7]
Dhooghe S, 2021, IACR CRYPTOL EPRINT, V734
[8]
Geng H, 2012, ICCAD-IEEE ACM INT, P163
[9]
Domain-Oriented Masking Compact Masked Hardware Implementations with Arbitrary Protection Order
[J].
PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16),
2016,
:3-3
[10]
He W, 2015, IEEE INT CONF ASAP, P64, DOI 10.1109/ASAP.2015.7245707