共 33 条
[1]
[Anonymous], 2007, POWER ANAL ATTACKS R, DOI [10.1007/978-0-387-38162-6, DOI 10.1007/978-0-387-38162-6]
[2]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[3]
Bronchain O., 2019, IACR CRYPTOLOGY EPRI, P132
[4]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[5]
Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
[6]
Chatzikokolakis K, 2010, LECT NOTES COMPUT SC, V6015, P390, DOI 10.1007/978-3-642-12002-2_33
[7]
A Statistical Test for Information Leaks Using Continuous Mutual Information
[J].
2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2011,
:177-190
[8]
Cover Thomas M, 2006, Elements of information theory
[9]
DOMINGOS P., 2000, P 17 INT C MACHINE L, P231
[10]
Making Masking Security Proofs Concrete Or How to Evaluate the Security of Any Leaking Device
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:401-429