共 44 条
[1]
Alipour A, 2020, DES AUT TEST EUROPE, P614, DOI 10.23919/DATE48585.2020.9116387
[2]
[Anonymous], 2018, IACR CRYPTOLOGY EPRI, V2018, P880
[3]
Apostolopoulos, 2019, CRITICAL INFRASTRUCT, P283, DOI DOI 10.1007/978-3-030-00024-0_15
[4]
Arora Mohit., 2012, EE TIMES, V5
[7]
Bhasin S, 2014, LECT NOTES COMPUT SC, V8804, P201, DOI 10.1007/978-3-319-12060-7_14
[8]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[9]
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I,
2016, 10031
:573-601
[10]
Less is More Dimensionality Reduction from a Theoretical Perspective
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:22-41