共 16 条
- [2] Berti Francesco., 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems, P256, DOI DOI 10.46586/TCHES.V2020.I1.256-320
- [3] Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
- [4] Blömer J, 2003, LECT NOTES COMPUT SC, V2742, P162
- [5] Boneh D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P37
- [6] Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 74 - 86
- [7] Dusart P, 2003, LECT NOTES COMPUT SC, V2846, P293
- [8] Efficient Design Strategies Based on the AES Round Function [J]. FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 334 - 353
- [9] SoK : On DFA Vulnerabilities of Substitution-Permutation Networks [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 403 - 414
- [10] Khairallah M, 2019, 2019 IEEE 8TH INTERNATIONAL WORKSHOP ON ADVANCES IN SENSORS AND INTERFACES (IWASI), P189, DOI 10.1109/IWASI.2019.8791393