共 27 条
[2]
Benadjila R., 2018, Study of deep learning techniques for side -channel analysis and introduction to ascad database, V22
[3]
Breiman L, 1996, MACH LEARN, V24, P123, DOI 10.1023/A:1018054314350
[4]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[5]
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:45-68
[7]
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[8]
He H., 2012, P ADV NEUR INF PROC, V25, P1
[9]
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
[J].
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019,
2020, 11959
:645-666
[10]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388