共 33 条
- [1] Backes M., 2010, USENIX SECURITY S, P307
- [2] Bartkewitz Timo, 2012, Smart Card Research and Advanced Applications. 11th International Conference (CARDIS 2012). Revised Selected Papers, P263, DOI 10.1007/978-3-642-37288-9_18
- [4] BISHOP C. M., 2006, Pattern recognition and machine learning, DOI [DOI 10.1117/1.2819119, 10.1007/978-0-387-45528-0]
- [5] Blake I.F., 1999, ELLIPTIC CURVES CRYP
- [6] Multiagent learning using a variable learning rate [J]. ARTIFICIAL INTELLIGENCE, 2002, 136 (02) : 215 - 250
- [7] Cybenko G., 1989, Mathematics of Control, Signals, and Systems, V2, P303, DOI 10.1007/BF02551274
- [8] Da Rolt Jean, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P89, DOI 10.1007/978-3-642-29912-4_8
- [10] De Mulder E, 2005, EUROCON 2005: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOL 1 AND 2 , PROCEEDINGS, P1879