共 14 条
- [1] Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
- [2] Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
- [3] Anderson R., 1997, LNCS, V1189
- [4] [Anonymous], ICS
- [5] Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
- [6] Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
- [7] Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
- [8] Gennaro R, 2004, LECT NOTES COMPUT SC, V2951, P258
- [9] Private circuits: Securing hardware against probing attacks [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 463 - 481
- [10] Ishai Y, 2006, LECT NOTES COMPUT SC, V4004, P308