共 28 条
[1]
AIST, 2015, SID CHANN ATT STAND
[3]
Bertoni G., 2008, NIST SHA 3 CONTEST
[4]
Bertoni G., 2010, P 18 IFAC S AUT CONT, P1
[5]
Bilgin B., 2014, CRYPTOGR COMMUN, P1
[6]
Bilgin B, 2014, LECT NOTES COMPUT SC, V8469, P267
[7]
Bilgin B, 2013, LECT NOTES COMPUT SC, V8086, P142, DOI 10.1007/978-3-642-40349-1_9
[8]
Bilgin B, 2012, LECT NOTES COMPUT SC, V7428, P76, DOI 10.1007/978-3-642-33027-8_5
[9]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[10]
Canright D, 2005, LECT NOTES COMPUT SC, V3659, P441