共 24 条
[1]
Bahdanau D, 2016, Arxiv, DOI [arXiv:1409.0473, 10.48550/arxiv.1409.0473]
[3]
Bronchain O., 2021, IACR Cryptol. ePrint Arch, P817
[4]
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:45-68
[5]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[6]
Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
[7]
Coron JS, 2009, LECT NOTES COMPUT SC, V5747, P156
[8]
Herbst C, 2006, LECT NOTES COMPUT SC, V3989, P239
[9]
Keskar N.S., 2017, ICLR
[10]
Kim J., 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems, V2019, DOI [DOI 10.13154/TCHES.V2019.I3.148-179, 10.13154/tches.v2019.i3.148-179, DOI 10.46586/TCHES.V2019.I3.148-179]