共 50 条
- [21] Extending SAT Solvers to Cryptographic Problems THEORY AND APPLICATIONS OF SATISFIABILITY TESTING - SAT 2009, PROCEEDINGS, 2009, 5584 : 244 - 257
- [22] Disguising Attacks with Explanation-Aware Backdoors 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 664 - 681
- [23] Fault Attacks on Cryptographic Circuits 2019 17TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2019,
- [24] Inversion attacks on secure hash functions using SAT solvers THEORY AND APPLICATIONS OF SATISFIABILITY TESTING - SAT 2007, PROCEEDINGS, 2007, 4501 : 377 - +
- [25] Superposition Attacks on Cryptographic Protocols INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
- [26] Synthesising attacks on cryptographic protocols AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 49 - 63
- [27] Highly parallel cryptographic attacks RECENT ADVANCES IN PARALLEL VIRTUAL MACHINE AND MESSAGE PASSING INTERFACE, 1997, 1332 : 367 - 374
- [28] A New Approach of the Cryptographic Attacks DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I, 2011, 166 : 521 - 534
- [30] Evaluation of Power Analysis Attacks on Cryptographic Circuit Using Adiabatic Logic 2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 410 - 414