共 50 条
- [4] Information Leakage Analysis of Complex C Code and Its application to OpenSSL [J]. LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: FOUNDATIONAL TECHNIQUES, PT I, 2016, 9952 : 909 - 925
- [5] Qualitative and Quantitative Analysis of Information Leakage in Java']Java Source Code [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 338 - 342
- [6] Side-Channel Information Leakage of Code-Based Masked Implementations [J]. 2022 17TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2022, : 51 - 56
- [7] A multipurpose information engine that can go beyond the Carnot limit [J]. JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, 2016,
- [8] Can Peer Code Reviews be Exploited for Later Information Needs? [J]. 2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME, 2009, : 259 - +
- [9] LEAKAGE SUPPRESSION IN THE TORIC CODE [J]. QUANTUM INFORMATION & COMPUTATION, 2015, 15 (11-12) : 997 - 1016
- [10] Leakage suppression in the toric code [J]. Quantum Information and Computation, 2015, 15 (11-12): : 997 - 1016