共 32 条
[1]
Abe M, 2012, LECT NOTES COMPUT SC, V7658, P4, DOI 10.1007/978-3-642-34961-4_3
[2]
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[3]
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[4]
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[5]
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:501-510
[6]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[7]
Cheon JH, 2006, LECT NOTES COMPUT SC, V4004, P1
[8]
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:152-161
[10]
Cryptography Against Continuous Memory Attacks
[J].
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2010,
:511-520