共 14 条
[1]
[Anonymous], 2007, AUSTROCHIP 2007
[2]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[3]
Fujimoto D., 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), P87, DOI 10.1109/HST.2011.5955002
[5]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[6]
Mangard S., 2007, Power Analysis Attacks
[8]
Nagata M., 2013, P 2013 AS PAC INT S
[9]
Popp T, 2005, LECT NOTES COMPUT SC, V3659, P172
[10]
Regazzoni F, 2007, IC-SAMOS: 2007 INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING AND SIMULATION, PROCEEDINGS, P209, DOI 10.1109/ICSAMOS.2007.4285753