共 22 条
[1]
[Anonymous], 2003236 CRYPT EPRINT
[2]
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
[3]
Boscher A., 2009, 6 INT WORKSH FAULT D, P3
[4]
Breveglieri L., 2009, 6 INT WORKSH FAULT D
[5]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[6]
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[7]
Guilley S, 2005, LECT NOTES COMPUT SC, V3659, P383
[8]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[9]
Li Y., 2011, IEEE INT S IN PRESS
[10]
Li Y, 2010, LECT NOTES COMPUT SC, V6225, P320, DOI 10.1007/978-3-642-15031-9_22