共 26 条
[1]
Bevan R., 2003, Information Security and Cryptology - ICISC 2002. 5th International Conference. Revised Papers (Lecture Notes in Computer Science Vol.2587), P327
[2]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[3]
Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
[4]
Clavier C, 2001, LECT NOTES COMPUT SC, V1965, P252
[5]
Coron JS, 2010, LECT NOTES COMPUT SC, V6225, P95, DOI 10.1007/978-3-642-15031-9_7
[6]
Coron JS, 2009, LECT NOTES COMPUT SC, V5747, P156
[7]
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[8]
Gierlichs B, 2008, LECT NOTES COMPUT SC, V5154, P426
[9]
Gierlichs B, 2006, LECT NOTES COMPUT SC, V4249, P15
[10]
Johnson O., 2004, Information theory and the Central Limit Theorem