共 58 条
[1]
[Anonymous], 2013, NEWNES
[2]
[Anonymous], 2016, LNCS, DOI DOI 10.1007/978-3-319-31271-2_14
[3]
Balasch Josep, 2015, Smart Card Research and Advanced Applications. 13th International Conference, CARDIS 2014. Revised Selected Papers: LNCS 8968, P64, DOI 10.1007/978-3-319-16763-3_5
[4]
Barthe G., 2016, ACM CCS 2016, P116, DOI DOI 10.1145/2976749.2978427
[5]
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I,
2017, 10210
:535-566
[6]
Verified Proofs of Higher-Order Masking
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:457-485
[7]
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016,
2016, 9813
:23-39
[8]
Becker G., TEST VECTOR LEAKAGE
[9]
Belaïd S, 2014, LECT NOTES COMPUT SC, V8874, P306, DOI 10.1007/978-3-662-45608-8_17
[10]
Improved Side-Channel Analysis of Finite-Field Multiplication
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:395-415