共 50 条
- [41] A Tolerant Algebraic Side-Channel Attack on AES Using CP PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING (CP 2017), 2017, 10416 : 189 - 205
- [42] Side-Channel Attack Using Meet-in-the-Middle Technique COMPUTER JOURNAL, 2010, 53 (07): : 934 - 938
- [45] Quantitative Evaluation of Side-channel Security for Elliptic Curve Cryptosystems PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 163 - 166
- [46] Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 144 - 148
- [48] Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 163 - 184
- [49] Side-channel AttacK User Reference Architecture Board SAKURA-W for Security Evaluation of IC Card 2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2015, : 565 - 569
- [50] An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 89 - 97