共 24 条
[1]
[Anonymous], 2017, P INT C LEARN REPR
[2]
Archambeau C, 2006, LECT NOTES COMPUT SC, V4249, P1
[3]
Benadjila R., 2018, IACR CRYPTOLOGY EPRI
[4]
Bhasin S., 2019, IACR CRYPTOLOGY EPRI
[6]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[7]
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:45-68
[8]
Carbone M., 2019, IACR T CRYPTOGR HARD, V3, P132, DOI DOI 10.13154/TCHES.V2019.I2.132-161
[9]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13