Funder
National Foundation for Science and Technology Development
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference32 articles.
1. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology—CRYPTO’ 99, pp. 388–397. Springer, Berlin, Heidelberg (1999)
2. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Lecture Notes in Computer Science, pp. 16–29. Springer, Berlin, Heidelberg (2004)
3. Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Koç, ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 13–28. Springer, Berlin, Heidelberg (2003)
4. Elaabid, M., Guilley, S., Hoogvorst, P.: Template attacks with a power model. In: IACR Cryptology ePrint Archive. 443, 01 (2007)
5. Lerman, L., Poussier, R., Markowitch, O., Standaert, F.-X.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8(4), 301–313 (2017)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献