共 44 条
[31]
Sadhukhan Rajat, 2021, 2021 58 ACM IEEE DES
[32]
Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:495-513
[33]
Shastri A, 2015, IEEE INT CONF ASAP, P202, DOI 10.1109/ASAP.2015.7245735
[35]
HLS-based Performance and Resource Optimization of Cryptographic Modules
[J].
2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS,
2018,
:1009-1016
[37]
Taher FN, 2018, IEEE INT ON LINE, P232, DOI 10.1109/IOLTS.2018.8474222
[38]
Takach Andres, 2016, 2016 21 ASIA S PACIF
[39]
Thillard A, 2013, LECT NOTES COMPUT SC, V8086, P21, DOI 10.1007/978-3-642-40349-1_2
[40]
Side-channel attack pitfalls
[J].
2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2,
2007,
:15-20