共 26 条
- [1] Bevan R., 2003, Information Security and Cryptology - ICISC 2002. 5th International Conference. Revised Papers (Lecture Notes in Computer Science Vol.2587), P327
- [2] Correlation power analysis with a leakage model [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
- [3] Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
- [4] Clavier C, 2001, LECT NOTES COMPUT SC, V1965, P252
- [5] Coron JS, 2010, LECT NOTES COMPUT SC, V6225, P95, DOI 10.1007/978-3-642-15031-9_7
- [6] Coron JS, 2009, LECT NOTES COMPUT SC, V5747, P156
- [7] Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
- [8] Gierlichs B, 2008, LECT NOTES COMPUT SC, V5154, P426
- [9] Gierlichs B, 2006, LECT NOTES COMPUT SC, V4249, P15
- [10] Johnson O., 2004, Information theory and the Central Limit Theorem