共 37 条
[1]
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[2]
[Anonymous], 2012, Sage for power users
[3]
Instruction Fault Attack on the Miller Algorithm in a Pairing-Based Cryptosystem
[J].
2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013),
2013,
:167-174
[4]
Barbulescu R, 2014, LECT NOTES COMPUT SC, V8441, P1, DOI 10.1007/978-3-642-55220-5_1
[5]
Blomer Johannes, 2013, Constructive Side-Channel Analysis and Secure Design. 4th International Workshop, COSADE 2013. Revised Selected Papers. LNCS 7864, P154, DOI 10.1007/978-3-642-40026-1_10
[6]
Blomer J., 2014, P FAULT TOL IN PRESS
[10]
Cohen H., 2006, HDB ELLIPTIC HYPEREL