共 27 条
[11]
Genevey-Metat C., 2020, IACR Cryptol. ePrint Arch, P952
[13]
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
[14]
Heuser Annelie, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P249, DOI 10.1007/978-3-642-29912-4_18
[16]
Kim J., 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems, V2019, DOI [DOI 10.13154/TCHES.V2019.I3.148-179, 10.13154/tches.v2019.i3.148-179, DOI 10.46586/TCHES.V2019.I3.148-179]
[17]
Lerman Liran, 2014, International Journal of Applied Cryptography, V3, P97, DOI 10.1504/IJACT.2014.062722
[18]
Long MS, 2018, ADV NEUR IN, V31
[19]
Maghrebi Houssem, 2016, Security, Privacy and Applied Cryptography Engineering. 6th International Conference, SPACE 2016. Proceedings: LNCS 10076, P3, DOI 10.1007/978-3-319-49445-6_1