共 26 条
[1]
Archambeau C, 2006, LECT NOTES COMPUT SC, V4249, P1
[3]
Bergstra J., 2011, P 2011 ANN C NEURAL, V24, DOI DOI 10.5555/2986459.2986743
[4]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[5]
Cagli Eleonora, 2016, Smart Card Research and Advanced Applications. 14th International Conference, CARDIS 2015. Revised Selected Papers: LNCS 9514, P15, DOI 10.1007/978-3-319-31271-2_2
[6]
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:45-68
[7]
Carbone M., 2019, IACR T CRYPTOGR HARD, V2019, P132, DOI DOI 10.13154/TCHES.V2019.I2.132-161
[8]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[9]
Efficient Template Attacks
[J].
SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013),
2014, 8419
:253-270
[10]
Building a side channel based disassembler
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2010, 6340 (PART 1)
:78-99