共 20 条
[3]
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:45-68
[4]
An Energy Trace Compression Method for Differential Power Analysis Attack
[J].
IEEE ACCESS,
2020, 8
:89084-89092
[5]
Chakraborty A, 2017, 2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P171, DOI 10.1109/HST.2017.7951835
[6]
Blind Source Separation from Single Measurements Using Singular Spectrum Analysis
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:42-59
[8]
Guo L., 2015, INT C INF SCI EL TEC
[9]
A chosen - plaintext differential power analysis attack on HMAC-SM3
[J].
2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS),
2015,
:350-353
[10]
Kim J., 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst., P148, DOI [DOI 10.46586/TCHES.V2019.I3.148-179, DOI 10.13154/TCHES.V2019.I3.148-179]