共 24 条
[1]
Bahdanau D, 2016, Arxiv, DOI arXiv:1409.0473
[3]
Bronchain O., 2021, IACR Cryptol. ePrint Arch., P817
[4]
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:45-68
[5]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[6]
Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
[7]
Coron JS, 2009, LECT NOTES COMPUT SC, V5747, P156
[8]
Herbst C, 2006, LECT NOTES COMPUT SC, V3989, P239
[9]
Keskar N. S., 2017, 5 INT C LEARN REPR
[10]
Kim J., 2019, IACR Trans. Cryptogr. Hardware Embedded Syst., V2019, P148, DOI [DOI 10.13154/TCHES.V2019.I3.148-179, 10.46586/tches.v2019.i3.148-179]