共 50 条
- [31] A tutorial on physical security and side-channel attacks FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108
- [33] Side-Channel Attacks and Machine Learning Approach 2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
- [34] On the Correctness of an Approach against Side-Channel Attacks INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
- [35] How to Compare Profiled Side-Channel Attacks? APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 485 - +
- [36] On the Feasibility of Side-Channel Attacks in a Virtualized Environment E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339
- [37] Improved side-channel collision attacks on AES SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 84 - 95
- [38] Wireless Charging Power Side-Channel Attacks CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 651 - 665
- [39] Better Side-Channel Attacks Through Measurements PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 15 - 26