共 33 条
[1]
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[2]
Anderson R. J., 2008, Security Engineering: A Guide to Building Dependable Distributed Systems
[3]
[Anonymous], 2012, WORKSH CRYPT HARDW E
[4]
[Anonymous], 2006, RUMP SESSION
[5]
BARRETT P, 1987, LECT NOTES COMPUT SC, V263, P311
[7]
Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
[8]
Clark Shane S., 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P700, DOI 10.1007/978-3-642-40203-6_39
[9]
Clavier C., 2001, LECT NOTES COMPUTER, V2162, P300
[10]
Clavier C, 2010, LECT NOTES COMPUT SC, V6476, P46, DOI 10.1007/978-3-642-17650-0_5