共 50 条
[11]
How to Compare Profiled Side-Channel Attacks?
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY,
2009, 5536
:485-+
[12]
Improved side-channel collision attacks on AES
[J].
SELECTED AREAS IN CRYPTOGRAPHY,
2007, 4876
:84-95
[13]
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
[J].
PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS,
2015,
:144-148
[15]
Side-Channel Attacks Based on Collaborative Learning
[J].
DATA SCIENCE, PT 1,
2017, 727
:549-557
[16]
Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
[J].
39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024,
2024,
:1405-1414
[17]
DRM to Counter Side-Channel Attacks?
[J].
DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT,
2007,
:23-32
[18]
Codes for Side-Channel Attacks and Protections
[J].
CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017,
2017, 10194
:35-55
[19]
Synthesis of Adaptive Side-Channel Attacks
[J].
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2017,
:328-342
[20]
Soft Analytical Side-Channel Attacks
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I,
2014, 8873
:282-296