共 50 条
- [41] An Information-Theoretic Model for Adaptive Side-Channel Attacks [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 286 - 296
- [42] Information theoretic evaluation of side-channel resistant logic styles [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 427 - +
- [43] Leveraging EM Side-Channel Information to Detect Rowhammer Attacks [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 729 - 746
- [44] Attacking OpenSSL ECDSA with a small amount of side-channel information [J]. Science China Information Sciences, 2018, 61
- [46] Poster Abstract: Context-Free Wearable Side-Channel Leaks Your Typing Privacy [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018,
- [47] Exposing Cache Timing Side-Channel Leaks through Out-of-Order Symbolic Execution [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2020, 4 (04):
- [48] My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack [J]. PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2021, 5 (04):
- [49] Channel Simulation With Quantum Side Information [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (03) : 1331 - 1342