共 27 条
[1]
Bartkewitz Timo, 2012, Smart Card Research and Advanced Applications. 11th International Conference (CARDIS 2012). Revised Selected Papers, P263, DOI 10.1007/978-3-642-37288-9_18
[2]
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis
[J].
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020),
2020,
[3]
Bhasin S, 2014, IEEE INT SYMP ELEC, P310
[4]
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:45-68
[5]
Cao P., 2021, IACR Transactions on Cryptographic Hardware and Embedded Systems, V2021, P27, DOI [10.46586/tches.v2021.i4.27-56, DOI 10.46586/TCHES.V2021.I4.27-56]
[6]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[8]
Template Attacks on Different Devices
[J].
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN,
2014, 8622
:179-198
[9]
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
[J].
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2019,