共 17 条
- [1] [Anonymous], 2001, FIPS 197 SPEC ADV EN
- [2] Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
- [3] AES power attack based on induced cache miss and countermeasure [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 586 - 591
- [4] Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
- [5] Biham Eli, 1996, Technion Computer Science Department Technical Report CS0884
- [6] Biryukov A, 2009, LECT NOTES COMPUT SC, V5912, P1, DOI 10.1007/978-3-642-10366-7_1
- [7] Biryukov A, 2009, LECT NOTES COMPUT SC, V5677, P231, DOI 10.1007/978-3-642-03356-8_14
- [8] Black J, 2006, LECT NOTES COMPUT SC, V4047, P328
- [9] Bogdanov A, 2011, LECT NOTES COMPUT SC, V7073, P344, DOI 10.1007/978-3-642-25385-0_19
- [10] Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741