共 23 条
[1]
[Anonymous], 2018, Deep Dive into Alibaba Cloud F3 FPGA as a Service Instances
[2]
[Anonymous], 2018, SPECTRE ATTACKS EXPL
[3]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[4]
Chen F, 2014, ACM COMPUTING FRONTI
[5]
Daemen J, 2000, LECT NOTES COMPUT SC, V1820, P277
[6]
Dutertre J.-M., 2012, DESIGN CIRCUITS INTE
[8]
Gnad DRE, 2017, I C FIELD PROG LOGIC
[9]
Kim Y, 2014, CONF PROC INT SYMP C, P361, DOI 10.1109/ISCA.2014.6853210
[10]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388