共 54 条
- [11] Borghoff J., 2012, IACR CRYPTOLOGY EPRI, P676
- [12] Borghoff J, 2009, LECT NOTES COMPUT SC, V5921, P133, DOI 10.1007/978-3-642-10868-6_9
- [13] Bukasa S.K., 2018, INT C AVAILABILITY R
- [14] Colombier B, 2019, PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P1, DOI 10.1109/HST.2019.8741030
- [15] Dantzig George B, 1951, Activity analysis of production and allocation, P339
- [16] NEW DIRECTIONS IN CRYPTOGRAPHY [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
- [17] Dragoi V.F., 2020, INT J COMPUT COMMUN, V15, P1
- [18] Experimental Analysis of the Laser-Induced Instruction Skip Fault Model [J]. SECURE IT SYSTEMS, NORDSEC 2019, 2019, 11875 : 221 - 237
- [20] Feldman J., 2003, Ph.D. Dissertation