共 23 条
[1]
AIST, 2019, EV ENV SID CHANN ATT
[2]
Benadjila Ryad, 2018, Report2018/053, V22, P2018
[3]
Correlation power analysis with a leakage model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS,
2004, 3156
:16-29
[4]
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017,
2017, 10529
:45-68
[5]
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[6]
Cui Xiaofan., 2019, 2019 American Control Conference (ACC), P1
[7]
Gierlichs B, 2006, LECT NOTES COMPUT SC, V4249, P15
[8]
Hettwer Benjamin, 2019, Selected Areas in Cryptography - SAC 2018. 25th International Conference. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11349), P479, DOI 10.1007/978-3-030-10970-7_22
[9]
Suggestion of Testing Method for Industrial Level Cyber-Physical System in Complex Environment
[J].
2019 IEEE 12TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2019),
2019,
:148-152
[10]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388