共 44 条
[1]
[Anonymous], 2020, ENISA Threat Landscape-The year in review-ENISA
[2]
Using ECC Feedback to Guide Voltage Speculation in Low-Voltage Processors
[J].
2014 47TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO),
2014,
:306-318
[3]
Voltage Noise in Multi-core Processors: Empirical Characterization and Optimization Opportunities
[J].
2014 47TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO),
2014,
:368-380
[5]
Callan R, 2015, 2015 9TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP)
[6]
FASE: Finding Amplitude-modulated Side-channel Emanations
[J].
2015 ACM/IEEE 42ND ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA),
2015,
:592-603
[7]
Das S, 2015, I SYMPOS LOW POWER E, P146, DOI 10.1109/ISLPED.2015.7273505
[10]
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:207-228