Power Consumption Attack Based on Improved Principal Component Analysis
暂无分享,去创建一个
Xu An Wang | Wei Zhang | Peng Ma | Ze-yu Wang
[1] Rached Tourki,et al. A Comparative Study of Power Consumption Models for CPA Attack , 2012 .
[2] Zhongsheng Wang,et al. Early Fault Feature Extraction of Rotor Imbalance and Self-Healing Monitoring , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).
[3] Fayez Gebali,et al. Classification of hardware trojan detection techniques , 2015, 2015 Tenth International Conference on Computer Engineering & Systems (ICCES).
[4] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[6] Mo Haghighi. Market-Based Resource Allocation for Energy-Efficient Execution of Multiple Concurrent Applications in Wireless Sensor Networks , 2013, MUSIC.
[7] Fang Zhou,et al. A new method for resisting collision attack based on parallel random delay S-box , 2019, IEICE Electron. Express.
[8] Yu Wang,et al. Research on drilling mud pump fault diagnosis based on fusion of acoustic emission and vibration technology , 2017 .
[9] Dengguo Feng,et al. Theoretical and practical aspects of multiple samples correlation power analysis , 2016, Secur. Commun. Networks.
[10] Fengqi Yu,et al. Correlation Power Analysis Attack against Synchronous Stream Ciphers , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[11] Xu Huang,et al. Minimizing hamming weight based on 1's complement of binary numbers over GF(2m) , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[12] S Sandeep,et al. Differential power analysis on FPGA implementation of MICKEY 128 , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[13] Mingliang Liu,et al. Circuit Breaker Fault Analysis Based on Wavelet Packet Time - Frequency Entropy and LM Algorithm to Optimize BP Neural Network , 2018, 2018 37th Chinese Control Conference (CCC).
[14] Guoqiang Bai,et al. Low-cost hardware implementation of SM4 based on composite field , 2016, 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference.
[15] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[16] Xu Sen,et al. A combinational power analysis method against cryptographic hardware , 2015, China Communications.
[17] Zhimin Zhang,et al. A Chosen-Plaintext Method of CPA on SM4 Block Cipher , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.
[18] Degang Sun,et al. Double-Key Recovery Based Correlation Power Analysis , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[19] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.