共 30 条
[1]
Boey KH, 2010, PROCEEDINGS OF THE 2010 IEEE ASIA PACIFIC CONFERENCE ON CIRCUIT AND SYSTEM (APCCAS), P756, DOI 10.1109/APCCAS.2010.5774887
[2]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[3]
A countermeasure against differential power analysis based on random delay insertion
[J].
2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS,
2005,
:3547-3550
[4]
Coron JS, 2010, LECT NOTES COMPUT SC, V6225, P95, DOI 10.1007/978-3-642-15031-9_7
[5]
Coron JS, 2009, LECT NOTES COMPUT SC, V5747, P156
[6]
Fledel Dor, 2019, Selected Areas in Cryptography - SAC 2018. 25th International Conference. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11349), P193, DOI 10.1007/978-3-030-10970-7_9
[7]
Fritzke A.W., 2012, OBFUSCATING SIDE CHA
[8]
Güneysu T, 2011, LECT NOTES COMPUT SC, V6917, P33, DOI 10.1007/978-3-642-23951-9_3
[9]
Lightweight Side-Channel Protection using Dynamic Clock Randomization
[J].
2020 30TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL),
2020,
:200-207
[10]
Hogenboom Jip, 2010, Principal component analysis and side-channel attacks, P536