共 50 条
- [31] An Efficient Memory Zeroization Technique Under Side-Channel Attacks [J]. 2019 32ND INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2019 18TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2019, : 76 - 81
- [32] ECC Atomic Block against Strong Side-Channel Attacks using Binary Curves [J]. 2019 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2019), 2019, : 387 - 393
- [33] Introduction to Side-Channel Attacks and Fault Attacks [J]. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
- [34] A new method for securing elliptic scalar multiplication against side-channel attacks [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 289 - 300
- [35] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
- [36] Side-Channel Attacks in a Real Scenario [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
- [37] Codes for Side-Channel Attacks and Protections [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
- [38] DRM to Counter Side-Channel Attacks? [J]. DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
- [40] Synthesis of Adaptive Side-Channel Attacks [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342