1. Lecture Notes in Computer Science;PC Kocher,1996
2. Hongsong, S.H.I., Jinping, G.A.O., Wei, J.I.A., et al.: Analyse of the security architecture and policy model in the common criteria. J. Tsinghua Univ. (Sci. Technol.) 56(5), 493–498 (2016)
3. Becker G, Cooper J, Demulder E, et al. Test vector leakage assessment (TVLA) methodology in practice. In: International Cryptographic Module Conference, pp. 1001-1013. Springer, Cham (2013)
4. Schneider, T., Moradi, A.: Leakage assessment methodology. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 495–513. Springer, Cham (2015)
5. Lecture Notes in Computer Science;AA Ding,2016