共 50 条
- [41] Security Analysis of DoS Attack against the LTE-A System [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1287 - 1292
- [42] Multi-Scroll Chaotic System Model and Its Cryptographic Application [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (13):
- [43] Construction of False Sequence Attack Against PLC based Power Control System [J]. PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 10090 - 10095
- [44] Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks [J]. PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 144 - 148
- [45] Research on Power Analysis Against Software-based and Hardware-based Cryptographic Circuits [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 10 - 18
- [47] A Critical Analysis of ISO 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules') [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 256 - 284
- [49] A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP [J]. CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 62 - 75
- [50] System Level Protection Against Side-Channel Attack Using High Performance Virtual Secure Circuit for Cryptographic Processor [J]. Wireless Personal Communications, 2021, 117 : 2667 - 2677