共 28 条
- [1] Amjad R.A, 2018, ABS180209766 CORR
- [2] [Anonymous], 2019, ARXIV190209037
- [3] Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 : 713 - 737
- [4] Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 45 - 68
- [5] Dougherty J., 1995, Machine Learning. Proceedings of the Twelfth International Conference on Machine Learning, P194
- [6] Hettwer Benjamin, 2019, Selected Areas in Cryptography - SAC 2018. 25th International Conference. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11349), P479, DOI 10.1007/978-3-030-10970-7_22
- [7] Kim J., 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst., P148, DOI [DOI 10.46586/TCHES.V2019.I3.148-179, DOI 10.13154/TCHES.V2019.I3.148-179]
- [8] Kraskov A, 2004, PHYS REV E, V69, DOI 10.1103/PhysRevE.69.066138
- [9] Maghrebi Houssem, 2016, Security, Privacy and Applied Cryptography Engineering. 6th International Conference, SPACE 2016. Proceedings: LNCS 10076, P3, DOI 10.1007/978-3-319-49445-6_1
- [10] Masure L., 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst., V2020, P348