共 50 条
- [31] How to Compare Profiled Side-Channel Attacks? APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 485 - +
- [32] On the Feasibility of Side-Channel Attacks in a Virtualized Environment E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339
- [33] Side-Channel Attack on the A5/1 Stream Cipher 2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 633 - 638
- [35] Side channel attacks against HMACs based on block-cipher based hash functions INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 432 - 443
- [37] Side-channel cryptographic attacks using pseudo-boolean optimization Constraints, 2016, 21 : 616 - 645