共 50 条
- [41] Side-Channel Attacks in a Real Scenario [J]. Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
- [42] Side-Channel Attacks on Cryptographic Software [J]. IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
- [43] Optimal Collision Side-Channel Attacks [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
- [44] A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 534 - 554
- [46] Soft Analytical Side-Channel Attacks [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
- [47] Cache Side-Channel Attacks and Defenses [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
- [48] Multi-class SVMs Analysis of Side-Channel Information of Elliptic Curve Cryptosystem [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2015,
- [49] Improved elliptic curve multiplication methods resistant against side channel attacks [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 296 - 313
- [50] Countermeasure of ECC against Side-channel Attacks: Balanced Point Addition and Point Doubling Operation Procedure [J]. 2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 465 - 469