共 83 条
[1]
Agosta G, 2012, DES AUT CON, P77
[2]
Almeida JB, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P53
[3]
[Anonymous], 2013, IACR Cryptol. ePrint Arch
[4]
[Anonymous], 2007, Logic synthesis and verification algorithms
[5]
[Anonymous], 2016, P IEEE S REAL TIM EM
[6]
[Anonymous], 2014, P 3 INT C PRINC SEC
[7]
[Anonymous], KECCAK IMPLEMENTATIO
[8]
[Anonymous], 2014, P 20 INT C TOOLS ALG
[9]
Antonopoulos T, 2017, ACM SIGPLAN NOTICES, V52, P362, DOI [10.1145/3062341.3062378, 10.1145/3140587.3062378]
[10]
Arribas Victor, 2017, P IACR CRYPT EPRINT, P1227