Author:
Maghrebi Houssem,Prouff Emmanuel,Guilley Sylvain,Danger Jean-Luc
Publisher
Springer Berlin Heidelberg
Reference28 articles.
1. Lecture Notes in Computer Science;D. Agrawal,2003
2. Lecture Notes in Computer Science;M.L. Akkar,2001
3. Lecture Notes in Computer Science;É. Brier,2004
4. Carlet, C.: Vectorial Boolean Functions for Cryptography (June 1 2008); Crama, Y., Hammer, P. (eds.): To appear as a chapter of the volume Boolean Methods and Models. Published by Cambridge University Press
5. Lecture Notes in Computer Science;S. Chari,1999
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Pre-Silicon Power Leakage Assessment Based on Generative Adversarial Networks;2023 26th Euromicro Conference on Digital System Design (DSD);2023-09-06
2. Power Side Channel Attacks: Where Are We Standing?;2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS);2021-06-28
3. Revisiting Higher-order Computational Attacks against White-box Implementations;Proceedings of the 6th International Conference on Information Systems Security and Privacy;2020
4. Security and Trust Assessment, and Design for Security;Hardware Security;2019
5. Multivariate High-Order Attacks of Shuffled Tables Recomputation;Journal of Cryptology;2017-06-19