共 21 条
- [1] [Anonymous], 2003, MULTIPLE SEQUENCE AL
- [2] Correlation power analysis with a leakage model [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
- [3] Algebraic Decomposition for Probing Security [J]. ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 742 - 763
- [4] Clavier C, 2001, LECT NOTES COMPUT SC, V1965, P252
- [5] Debande N., 2011, 2011 IEEE International Workshop on Information Forensics and Security (WIFS 2011), DOI 10.1109/WIFS.2011.6123143
- [7] Guilley S, 2011, LECT NOTES COMPUT SC, V6633, P100, DOI 10.1007/978-3-642-21040-2_7
- [8] Hodgers P, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P131, DOI 10.1109/HST.2013.6581578
- [9] Jurafsky D., 2012, MINIMUM EDIT DISTANC
- [10] Le TH, 2007, INT CONF ACOUST SPEE, P257