共 26 条
[1]
Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts
[J].
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014,
2014, 8651
:1-18
[2]
Belaïd S, 2014, LECT NOTES COMPUT SC, V8874, P306, DOI 10.1007/978-3-662-45608-8_17
[3]
Improved Side-Channel Analysis of Finite-Field Multiplication
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:395-415
[4]
Berti F., 2016, CARDIS, P245
[5]
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1,
2019, 11692
:713-737
[6]
de Cherisey Eloi, 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst., V2019, P49
[7]
De Cnudde T., 2018, IACR T CRYPTOGR HARD, P123, DOI [10.46586/tches.v2018.i2.123-148, DOI 10.46586/TCHES.V2018.I2.123-148]
[8]
Does Coupling Affect the Security of Masked Implementations?
[J].
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN,
2017, 10348
:1-18
[9]
Making Masking Security Proofs Concrete Or How to Evaluate the Security of Any Leaking Device
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:401-429
[10]
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
[J].
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II,
2016, 9815
:272-301