共 16 条
- [1] [Anonymous], 2007, POWER ANAL ATTACKS R, DOI [DOI 10.1007/978-0-387-38162-6, 10.1007/978-0-387-38162-6]
- [2] Correlation power analysis with a leakage model [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
- [3] Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 163 - 177
- [4] Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
- [5] Efficient Template Attacks [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 253 - 270
- [6] EnOcean Alliance Inc, 2018, ASECURITY ENOCEAN RA
- [7] Gnad D. R., 2019, IACR T CRYPTOGRAPHIC, P305, DOI DOI 10.13154/TCHES.V2019.I3.305-339
- [8] SideLine: How Delay-Lines (May) Leak Secrets from Your SoC [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 3 - 30
- [10] Lipp M, 2021, P IEEE S SECUR PRIV, P355, DOI 10.1109/SP40001.2021.00063