共 34 条
[1]
[Anonymous], PERCOM 05 P 3 IEEE I
[3]
Awasthi A. K., 2004, T CRYPTOLOGY, V1, P15
[4]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[5]
Carman D., 2000, CONSTRAINTS APPROACH
[6]
Chaturvedi Ankita, 2013, Information Systems Security. 9th International Conference, ICISS 2013. Proceedings: LNCS 8303, P63, DOI 10.1007/978-3-642-45204-8_5
[8]
Delgado-Mohatar O, 2010, LECT NOTES COMPUT SC, V6033, P332, DOI 10.1007/978-3-642-12368-9_27
[9]
Hagras E. A. A. A., 2011, 28 NRSC
[10]
Heinzelman W.R., 2000, 33 HAWAII INT C SYST