共 32 条
[11]
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4876, P84
[12]
Bouillaguet C, 2011, LECT NOTES COMPUT SC, V6841, P169, DOI 10.1007/978-3-642-22792-9_10
[13]
Chen CN, 2003, LECT NOTES COMPUT SC, V2727, P118
[14]
Chong Hee Kim, 2010, Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2010), P3, DOI 10.1109/FDTC.2010.10
[15]
Choukri H., 2005, 2005 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), P13
[16]
Clavier Christophe, 2010, Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2010), P10, DOI 10.1109/FDTC.2010.17
[17]
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[18]
Dusart P, 2003, LECT NOTES COMPUT SC, V2846, P293
[19]
FIPS, 2001, ADV ENCR STAND AES P
[20]
Giraud C, 2005, LECT NOTES COMPUT SC, V3373, P27