共 29 条
[1]
[Anonymous], 2008, POWER ANAL ATTACKS R
[2]
Biham E., 1992, CRYPTO 92, V740, P487, DOI 10.1007/3-540-48071-4_34
[3]
Differential properties of power functions
[J].
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY,
2010,
:2478-2482
[4]
Carlet C, 2005, LECT NOTES COMPUT SC, V3797, P49
[5]
Carlet C., 2010, BOOLEAN MODELS METHO, P398
[6]
Chabaud F., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P356, DOI 10.1007/BFb0053450
[8]
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012,
2012, 7428
:233-250
[9]
Guilley S, 2004, INT FED INFO PROC, V153, P127
[10]
Hui Zhao, 2013, Information Security Practice and Experience. 9th International Conference, ISPEC 2013. Proceedings, P336, DOI 10.1007/978-3-642-38033-4_24