共 11 条
[1]
Bhasin S., NICV NORMALIZED INTE
[2]
Chari S., 2003, TEMPLATE ATTACKS
[3]
Gandolfi K., 2001, ELECTROMAGNETIC ANAL
[4]
Hastie T., 2009, Springer Series in Statistics, DOI DOI 10.1007/B94608
[5]
Hospodar G., 2011, MACHINE LEARNING SID
[6]
Karsmakers P., 2019, SIDE CHANNEL ATTACKS
[7]
Kocher P., 1999, Differential power analysis
[8]
Kocher P. C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P104
[9]
Kreder K., 2017, HARDWARE WALLET VULN
[10]
Maghrebi Houssem, 2016, Security, Privacy and Applied Cryptography Engineering. 6th International Conference, SPACE 2016. Proceedings: LNCS 10076, P3, DOI 10.1007/978-3-319-49445-6_1