暂无分享,去创建一个
[1] Chintan Patel,et al. Fiscal: Firmware identification using side-channel power analysis , 2017, 2017 IEEE 35th VLSI Test Symposium (VTS).
[2] Joel Nothman,et al. SciPy 1.0-Fundamental Algorithms for Scientific Computing in Python , 2019, ArXiv.
[3] PlusquellicJim,et al. Detecting Trojans through leakage current analysis using multiple supply pad IDDQS , 2010 .
[4] K. Jarrod Millman,et al. Array programming with NumPy , 2020, Nat..
[5] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[6] Shyamanta M. Hazarika,et al. Wavelet Selection for EMG Based Grasp Recognition through CWT , 2011, ACC.
[7] C. Torrence,et al. A Practical Guide to Wavelet Analysis. , 1998 .
[8] Xavier Charvet,et al. Improving the DPA attack using Wavelet transform ∗ , 2005 .
[9] M. Salman Leong,et al. Wavelet Analysis: Mother Wavelet Selection Methods , 2013 .
[10] D. Okaya,et al. Frequency‐time decomposition of seismic data using wavelet‐based methods , 1995 .
[11] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[12] Michael Hutter,et al. The Temperature Side Channel and Heating Fault Attacks , 2013, CARDIS.
[13] Swarup Bhunia,et al. Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection , 2010, CHES.
[14] Thomas Hiscock,et al. A Bit-Level Approach to Side Channel Based Disassembling , 2019, CARDIS.
[15] Ingrid Daubechies,et al. 1. The What, Why, and How of Wavelets , 1992 .
[16] Stergios J. Papadakis,et al. Toward an RF side-channel reverse engineering tool , 2020, 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE).
[17] Qingyuan Wang,et al. Comparisons between real and complex Gauss wavelet transform methods of three-dimensional shape reconstruction , 2015, Applied Optics and Photonics China.
[18] M J Burke,et al. Wavelet based analysis and characterization of the ECG signal , 2004, Journal of medical engineering & technology.
[19] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[20] Wenyuan Xu,et al. WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices , 2013, HealthTech.
[21] S. Lawson,et al. Image compression using wavelets and JPEG2000: a tutorial , 2002 .
[22] James W. Nilsson,et al. Electric Circuits , 1983 .
[23] Julie Ferrigno,et al. When AES blinks: introducing optical side channel , 2008, IET Inf. Secur..
[24] Arrow Buttons. Frequently asked questions , 2009 .
[25] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[26] Aaron O'Leary,et al. PyWavelets: A Python package for wavelet analysis , 2019, J. Open Source Softw..
[27] Sylvain Guilley,et al. Wavelet transform based pre-processing for side channel analysis , 2012, 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops.
[28] Domenic Forte,et al. Power-based Side-Channel Instruction-level Disassembler , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[29] Christof Paar,et al. Building a Side Channel Based Disassembler , 2010, Trans. Comput. Sci..
[30] Christof Paar,et al. SCANDALee: A side-ChANnel-based DisAssembLer using local electromagnetic emanations , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).