共 27 条
[1]
Ali S., 2016, SECURE SYSTEM DESIGN, P163
[2]
Aranguren EG, 2014, REV TELEM TICA, V13, P46
[4]
Chodowiec P, 2003, LECT NOTES COMPUT SC, V2779, P319, DOI 10.1007/978-3-540-45238-6_26
[5]
Daemen J., 2002, DESIGN RIJNDAEL INFO
[6]
Electromagnetic Transient Faults Injection on a hardware and a software implementations of AES
[J].
2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC),
2012,
:7-15
[7]
Dusart P, 2003, LECT NOTES COMPUT SC, V2846, P293
[8]
Fips P, 2001, ADV ENCRYPTION STAND
[9]
Fault Attacks on AES with Faulty Ciphertexts Only
[J].
2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013),
2013,
:108-118
[10]
Differential Fault Intensity Analysis
[J].
2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014),
2014,
:49-58