Author:
Coron Jean-Sébasticn,Kocher Paul,Naccache David
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. R. Anderson, M. Kuhn, Tamper resistance-a cautionary note, The second USBNix workshop on electronic commerce, pp. 1–11, 1996.
2. C. Bennett, Logical reversibility of computation, IBM Journal of R&D, vol. 17, pp. 525–532, 1973.
3. Lect Notes Comput Sci;E. Biham,1997
4. Lect Notes Comput Sci;D. Boneh,1997
5. Lect Notes Comput Sci;S. Chari,1999
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Differential Power Analysis of the Picnic Signature Scheme;Post-Quantum Cryptography;2021
2. Side-Channel Distinguishers;Side-Channel Analysis of Embedded Systems;2021
3. Hardware Trojans in Microcircuits;Viruses, Hardware and Software Trojans;2020
4. Research on Online Leakage Assessment;Communications in Computer and Information Science;2020
5. An Efficient Side Channel Attack Technique with Improved Correlation Power Analysis;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2020