共 15 条
[1]
Akkar M.-L., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P309
[2]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[3]
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[4]
Ekdahl P, 2003, LECT NOTES COMPUT SC, V2595, P47
[5]
Fischer W, 2007, LECT NOTES COMPUT SC, V4377, P257
[7]
Henricksen M, 2010, LECT NOTES COMPUT SC, V6168, P53, DOI 10.1007/978-3-642-14081-5_4
[8]
Hibiki Takafumi, 2013, Constructive Side-Channel Analysis and Secure Design. 4th International Workshop, COSADE 2013. Revised Selected Papers. LNCS 7864, P169, DOI 10.1007/978-3-642-40026-1_11
[9]
Kiyomoto S, 2007, SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, P204
[10]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388