共 33 条
- [1] [Anonymous], 2007, POWER ANAL ATTACKS R, DOI [10.1007/978-0-387-38162-6, DOI 10.1007/978-0-387-38162-6]
- [2] Correlation power analysis with a leakage model [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
- [3] Bronchain O., 2019, IACR CRYPTOLOGY EPRI, P132
- [4] Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
- [5] Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
- [6] Chatzikokolakis K, 2010, LECT NOTES COMPUT SC, V6015, P390, DOI 10.1007/978-3-642-12002-2_33
- [7] A Statistical Test for Information Leaks Using Continuous Mutual Information [J]. 2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 177 - 190
- [8] Cover Thomas M, 2006, Elements of information theory
- [9] DOMINGOS P., 2000, P 17 INT C MACHINE L, P231
- [10] Making Masking Security Proofs Concrete Or How to Evaluate the Security of Any Leaking Device [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 401 - 429