共 242 条
[81]
Remote Side-Channel Attacks on Heterogeneous SoC
[J].
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019,
2020, 11833
:109-125
[82]
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
[J].
FAST SOFTWARE ENCRYPTION, FSE 2014,
2015, 8540
:18-37
[83]
Grossschadl Johann, 2009, Information Security and Cryptology, ICISC 2009. 12th International Conference, ICISC 2009. Revised Selected Papers, P176
[84]
Gruss Daniel, 2016, Detection of Intrusions and Malware, and Vulnerability Assessment. 13th International Conference, DIMVA 2016. Proceedings: LNCS 9721, P300, DOI 10.1007/978-3-319-40667-1_15
[85]
Güneysu T, 2011, LECT NOTES COMPUT SC, V6917, P33, DOI 10.1007/978-3-642-23951-9_3
[87]
Hailong L., 2017, J. Electrotechnol., Elect. Eng. Manage., V1, P23
[90]
Heuser Annelie, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P249, DOI 10.1007/978-3-642-29912-4_18