共 35 条
- [1] Ade-Ibijola A. O., 2012, Int. J. Comput. Appl., V54, P24
- [2] Akalp Kuzu E, 2013, IEEE INT ADV COMPUT, P138
- [3] Amiel F, 2007, LECT NOTES COMPUT SC, V4876, P110
- [4] [Anonymous], IACR CRYPTOLOGY EPRI
- [5] Bauer Aurelie, 2013, Progress in Cryptology - INDOCRYPT 2013. 14th International Conference on Cryptology in India. Proceedings: LNCS 8250, P98, DOI 10.1007/978-3-319-03515-4_7
- [6] Bauer Sven, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P82, DOI 10.1007/978-3-642-29912-4_7
- [7] Black P.E., 2005, Dictionary of algorithms and data structures
- [8] Correlation power analysis with a leakage model [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
- [9] den Boer B, 2002, LECT NOTES COMPUT SC, V2523, P228
- [10] Fouque PA, 2003, LECT NOTES COMPUT SC, V2779, P254, DOI 10.1007/978-3-540-45238-6_21