共 24 条
[1]
Billet O, 2005, LECT NOTES COMPUT SC, V3357, P227
[2]
Biryukov A, 2018, LECT NOTES COMPUT SC, V11273, P373, DOI 10.1007/978-3-030-03329-3_13
[3]
Blum A., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P435, DOI 10.1145/335305.335355
[4]
Bogdanov A., 2019, CHES 2019 CAPTURE FL, V2nd
[5]
Higher-Order DCA against Standard Side-Channel Countermeasures
[J].
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019),
2019, 11421
:118-141
[6]
Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016,
2016, 9813
:215-236
[7]
Breunesse C.B., 2018, 2018095 CRYPT EPRINT
[8]
Chow S, 2002, LECT NOTES COMPUT SC, V2696, P1
[9]
Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
[10]
Clavier C, 2001, LECT NOTES COMPUT SC, V1965, P252