共 27 条
[1]
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[2]
Benadjila R., 2017, SECURE AES128 ATMEGA
[3]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[4]
Cooper J., 2013, INT CRYPT MOD C
[5]
Das D, 2019, PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P11, DOI 10.1109/HST.2019.8740839
[6]
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[7]
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
[J].
TOPICS IN CRYPTOLOGY - CT-RSA 2016,
2016, 9610
:219-235
[8]
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:207-228
[9]
Heyszl Johann, 2012, Smart Card Research and Advanced Applications. 11th International Conference (CARDIS 2012). Revised Selected Papers, P248, DOI 10.1007/978-3-642-37288-9_17
[10]
Heyszl J, 2012, LECT NOTES COMPUT SC, V7178, P231, DOI 10.1007/978-3-642-27954-6_15