共 26 条
[1]
[Anonymous], 2014, IACR CRYPTOL EPRINT
[2]
Bernstein D. J., 2008, Post Quantum Cryptography, V1st
[3]
Bilgin B, 2014, LECT NOTES COMPUT SC, V8874, P326, DOI 10.1007/978-3-662-45608-8_18
[4]
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[5]
FPGA implementations of SPRING and their countermeasures against side-channel attacks
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2014, 8731
:414-432
[6]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[7]
Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
[8]
Coron JS, 2014, LECT NOTES COMPUT SC, V8441, P441, DOI 10.1007/978-3-642-55220-5_25
[9]
Ducas L, 2013, LECT NOTES COMPUT SC, V8042, P40, DOI 10.1007/978-3-642-40041-4_3
[10]
Fan Junfeng, 2012, IACR Cryptol. ePrint Arch., V144