共 13 条
[1]
[Anonymous], 2012, IEEE/ ACM Transactions on Networking
[2]
[Anonymous], LECT NOTES COMPUTER
[3]
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
[4]
BONEH D, 1997, P ADV CRYPT EUR 97, P37
[5]
An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks
[J].
2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC),
2012,
:95-102
[6]
Fault Attacks on AES with Faulty Ciphertexts Only
[J].
2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013),
2013,
:108-118
[7]
Hall C, 1999, LECT NOTES COMPUT SC, V1726, P2
[8]
Li Y, 2010, LECT NOTES COMPUT SC, V6225, P320, DOI 10.1007/978-3-642-15031-9_22
[10]
National Institute of Standards and Technology, 2001, FIPS 197, P1