共 12 条
- [1] Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
- [2] Halderman J. A., 2008, USENIX SEC S
- [3] Private circuits: Securing hardware against probing attacks [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 463 - 481
- [4] Jungmin Park, 2012, Proceedings 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2012), P63, DOI 10.1109/HST.2012.6224321
- [5] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
- [6] Kocher P. C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P104
- [8] Micali S, 2004, LECT NOTES COMPUT SC, V2951, P278
- [9] Quisquater JJ., 2001, Smart Card Programming and Security, P200, DOI DOI 10.1007/3-540-45418-7
- [10] Samyde D, 2003, FIRST INTERNATIONAL IEEE SECURITY IN STORAGE WORKSHOP, PROCEEDING, P65, DOI 10.1109/SISW.2002.1183512