共 50 条
- [1] Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 495 - 513
- [2] Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 517 - +
- [3] A Frequency-based Leakage Assessment Methodology for Side-Channel Evaluations 2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 590 - 593
- [4] Side-channel countermeasures’ dissection and the limits of closed source security evaluations IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 1 - 25
- [5] Side-Channel Leakage Detection Based on Constant Parameter Channel Model 2020 IEEE 38TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2020), 2020, : 553 - 560
- [6] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
- [7] Testing Cache Side-channel Leakage 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
- [9] Side-Channel Leakage across Borders SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 36 - 48
- [10] Side-channel leakage tolerant architectures THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 204 - +