共 40 条
[1]
Ambrose Jude Angelo, 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), P678, DOI 10.1109/ICCAD.2008.4681650
[2]
Bucci M, 2006, LECT NOTES COMPUT SC, V4249, P232
[3]
Das D., 2017, HIGH EFFICIENCY POWE
[4]
Doulcier-Verdier M., 2011, 2011 IEEE International Solid-State Circuits Conference (ISSCC 2011), P274, DOI 10.1109/ISSCC.2011.5746316
[5]
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
[J].
TOPICS IN CRYPTOLOGY - CT-RSA 2016,
2016, 9610
:219-235
[6]
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:207-228
[7]
Goodwill G., 2011, NIST NON ATT TEST WO, P115
[8]
Guneysu T., 2011, GENERIC SIDE CHANNEL, P33
[10]
Hernandez H., 2012, 2012 25 S INT CIRC S, P1