共 47 条
[23]
Coron JS, 2014, LECT NOTES COMPUT SC, V8441, P441, DOI 10.1007/978-3-642-55220-5_25
[24]
Daemen J., 1994, Fast Software Encryption. Cambridge Security Workshop Proceedings, P18
[25]
Daemen J., 2001, Fast Software Encryption. 7th International Workshop, FSE 2000. Proceedings (Lecture Notes in Computer Science Vol.1978), P134
[26]
deCanniere C., 2007, THESIS
[27]
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014,
2014, 8441
:423-440
[28]
Golic JD, 2002, LECT NOTES COMPUT SC, V2523, P198
[29]
Private circuits: Securing hardware against probing attacks
[J].
ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS,
2003, 2729
:463-481
[30]
Knudsen L, 2010, LECT NOTES COMPUT SC, V6225, P16, DOI 10.1007/978-3-642-15031-9_2