共 25 条
- [1] [Anonymous], 2005, P ECRYPT WORKSH RFID
- [2] Batina L, 2009, LECT NOTES COMPUT SC, V5747, P112
- [3] Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 236 - 252
- [4] Correlation power analysis with a leakage model [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
- [6] Chenyang Tu, 2017, Applied Cryptography and Network Security. 15th International Conference, ACNS 2017. Proceedings: LNCS 10355, P415, DOI 10.1007/978-3-319-61204-1_21
- [9] Wirelessly Pickpocketing a Mifare Classic Card [J]. PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 3 - 15
- [10] ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1626 - 1638