共 31 条
[1]
[Anonymous], 2014, P 3 WORKSH HARDW ARC
[2]
Archambeau C, 2006, LECT NOTES COMPUT SC, V4249, P1
[3]
Batina L, 2012, LECT NOTES COMPUT SC, V7178, P383, DOI 10.1007/978-3-642-27954-6_24
[4]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[5]
Bruneau N, 2014, LECT NOTES COMPUT SC, V8804, P183, DOI 10.1007/978-3-319-12060-7_13
[6]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[7]
Efficient Template Attacks
[J].
SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013),
2014, 8419
:253-270
[9]
Cover Thomas M., 2006, Elements of Information Theory, V2nd
[10]
Danger J.-L., 2014, P 1 WORKSH CRYPT SEC, V7, P7, DOI [10.1145/2556315.2556316, DOI 10.1145/2556315.2556316]