Author:
Asano Tamon,Sugawara Takeshi
Funder
Japan Society for the Promotion of Science
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference34 articles.
1. Mangard, S., Oswald, E., Popp, T.: Power analysis attacks - revealing the secrets of smart cards, Springer (2007)
2. Roche, T., Lomné, V., Mutschler, C., Imbert, L.A.: Side journey to Titan, pp. 231–248. USENIX Association (2021)
3. Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis, Vol. 1666 of Lecture Notes in Computer Science, pp. 388–397, Springer (1999)
4. Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks, Vol. 1666 of Lecture Notes in Computer Science, pp. 398–412. Springer (1999)
5. Barthe, G. et al.: Parallel implementations of masking schemes and the bounded moment leakage model, Vol. 10210 of Lecture Notes in Computer Science, pp. 535–566. (2017)