共 22 条
- [1] Agoyan M., 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST 2010), P113, DOI 10.1109/THS.2010.5655079
- [2] Breier J., 2018, FAULT TOLERANT ARCHI, P81, DOI DOI 10.1007/978-981-10-1387-4_5
- [4] Courbon F, 2014, 2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P60, DOI 10.1109/HST.2014.6855569
- [5] Dusart P, 2003, LECT NOTES COMPUT SC, V2846, P293
- [6] Differential Fault Attacks on KLEIN [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 80 - 95
- [7] Kim CH, 2008, LECT NOTES COMPUT SC, V5189, P48
- [9] Piret G, 2003, LECT NOTES COMPUT SC, V2779, P77, DOI 10.1007/978-3-540-45238-6_7
- [10] Rodriguez Joaquin, 2019, 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). Proceedings, P41, DOI 10.1109/FDTC.2019.00014