共 35 条
[1]
[Anonymous], Synopsys PrimePower
[2]
Batina L, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P515
[4]
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016,
2016, 9696
:537-557
[5]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[6]
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1,
2019, 11692
:713-737
[8]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[9]
Drechsler R., 2004, ADV FORMAL VERIFICAT
[10]
Dubey A, 2020, PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P197, DOI [10.1109/host45689.2020.9300276, 10.1109/HOST45689.2020.9300276]