共 14 条
- [1] [Anonymous], 2001, LNCS, DOI DOI 10.1007/3-540-45418-7
- [2] Bishop C., 2006, Pattern recognition and machine learning, P423
- [3] Clavier Christophe, 2013, Progress in Cryptology - INDOCRYPT 2013. 14th International Conference on Cryptology in India. Proceedings: LNCS 8250, P116, DOI 10.1007/978-3-319-03515-4_8
- [4] Clavier C., 2004, Side channel analysis for reverse engineering (scare)-an improved attack against a secret a3/a8 gsm algorithm
- [5] Eisenbarth T, 2008, LECT NOTES COMPUT SC, V5157, P203, DOI 10.1007/978-3-540-85174-5_12
- [6] Goldack M., 2008, THESIS
- [7] Mousa A., 2006, Int. J. Comput. Sci. Appl, V3, P44
- [8] Msgna Mehari, 2014, Information Security Practice and Experience. 10th International Conference, ISPEC 2014. Proceedings: LNCS 8434, P129, DOI 10.1007/978-3-319-06320-1_11
- [9] Nasrabadi N. M, 2007, J ELECTRON IMAGING, V16, P33
- [10] Novak R, 2003, LECT NOTES COMPUT SC, V2846, P307