共 10 条
[1]
Aigner H, 2004, LECT NOTES COMPUT SC, V3156, P107
[2]
Akkar ML, 2003, LECT NOTES COMPUT SC, V2567, P267
[3]
BODGANOV A, 2006, FCCM, P237
[4]
Ding JT, 2005, LECT NOTES COMPUT SC, V3531, P164
[5]
Grossschadl J., 2000, Cryptographic Hardware and Embedded Systems - CHES 2000. Second International Workshop. Proceedings (Lecture Notes in Computer Science Vol.1965), P191
[6]
Kipnis A, 1999, LECT NOTES COMPUT SC, V1592, P206
[7]
Schroeppel R, 2002, LECT NOTES COMPUT SC, V2523, P366
[8]
Wang LC, 2005, LECT NOTES COMPUT SC, V3386, P244
[9]
Yang BY, 2006, LECT NOTES COMPUT SC, V3934, P73
[10]
Yang Bo-Yin, 2004, RANK ATTACKS DEFENCE