共 28 条
[2]
Benesty J, 2009, SPRINGER TOP SIGN PR, V2, P37, DOI 10.1007/978-3-642-00296-0_5
[3]
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:45-68
[4]
Daemen J, 2001, DR DOBBS J, V26, P137
[5]
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
[J].
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2019,
[6]
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I,
2016, 9665
:240-262
[8]
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[9]
Gao Y., 2018, P 55 ACM ESDA IEEE D, P1
[10]
Kim J., 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems, V2019, DOI [DOI 10.13154/TCHES.V2019.I3.148-179, 10.13154/tches.v2019.i3.148-179, DOI 10.46586/TCHES.V2019.I3.148-179]