共 50 条
- [3] Practical Algebraic Side-Channel Attacks Against ACORN [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
- [5] Side-Channel Analysis of Keymill [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 138 - 152
- [6] On XTR and side-channel analysis [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3357 : 54 - 68
- [8] A Complete Tolerant Algebraic Side-Channel Attack for AES with CP [J]. PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING, 2018, 11008 : 259 - 275
- [9] A Tolerant Algebraic Side-Channel Attack on AES Using CP [J]. PRINCIPLES AND PRACTICE OF CONSTRAINT PROGRAMMING (CP 2017), 2017, 10416 : 189 - 205
- [10] Federated Learning in Side-Channel Analysis [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272