共 10 条
- [1] Aigner H, 2004, LECT NOTES COMPUT SC, V3156, P107
- [2] Akkar ML, 2003, LECT NOTES COMPUT SC, V2567, P267
- [3] BODGANOV A, 2006, FCCM, P237
- [4] Ding JT, 2005, LECT NOTES COMPUT SC, V3531, P164
- [5] Grossschadl J., 2000, Cryptographic Hardware and Embedded Systems - CHES 2000. Second International Workshop. Proceedings (Lecture Notes in Computer Science Vol.1965), P191
- [6] Kipnis A, 1999, LECT NOTES COMPUT SC, V1592, P206
- [7] Schroeppel R, 2002, LECT NOTES COMPUT SC, V2523, P366
- [8] Wang LC, 2005, LECT NOTES COMPUT SC, V3386, P244
- [9] Yang BY, 2006, LECT NOTES COMPUT SC, V3934, P73
- [10] Yang Bo-Yin, 2004, RANK ATTACKS DEFENCE