共 50 条
- [31] Dynamic Gold Code-Based Chaotic Clock for Cryptographic Designs to Counter Power Analysis Attacks [J]. PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2023, GLSVLSI 2023, 2023, : 439 - 442
- [32] Research on elliptic curve cryptographic algorithms based on Chaotic System [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 77 - 81
- [34] Machine Learning Attack to Power Traces of Data Movement in Cryptographic Chip [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2019, 48 (03): : 415 - 419
- [35] Differential power analysis for cryptographic ICs [J]. ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL IV, 2007, : 292 - 295
- [36] A modified chaotic cryptographic method [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 123 - 126
- [37] A modified chaotic cryptographic method [J]. COMPUTER PHYSICS COMMUNICATIONS, 2001, 138 (03) : 234 - 236
- [38] A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation [J]. IEEE EUROPEAN TEST SYMPOSIUM, ETS 2024, 2024,
- [39] Proposal of PingPong-128 Countermeasure against Power Analysis Attack [J]. 2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 431 - 434
- [40] CALPAN: Countermeasure against Leakage Power Analysis Attack by Normalized DDPL [J]. PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,