共 50 条
- [42] Side-Channel Analysis of PUFs and Fuzzy Extractors TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 33 - 47
- [43] Algebraic Side-Channel Analysis in the Presence of Errors CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 428 - +
- [44] Side-Channel Analysis of MAC-Keccak 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2013, : 125 - 130
- [45] Side-Channel Vulnerabilities of Unified Point Addition on Binary Huff Curve and Its Countermeasure APPLIED SCIENCES-BASEL, 2018, 8 (10):
- [47] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
- [48] Virtual Triggering: a Technique to Segment Cryptographic Processes in Side-Channel Traces 2022 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS), 2022, : 49 - 54
- [49] OPAL: On-the-go Physical Attack Lab to Evaluate Power Side-channel Vulnerabilities on FPGAs PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON PHYSICAL ASSURANCE AND INSPECTION ON ELECTRONICS (PAINE), 2021,
- [50] STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 859 - 874