Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods
暂无分享,去创建一个
[1] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[2] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[3] M. Kendall. Statistical Methods for Research Workers , 1937, Nature.
[4] Alfred Menezes,et al. Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.
[5] Zoya Dyka,et al. Area efficient hardware implementation of elliptic curve cryptography by iteratively applying Karatsuba's method , 2005, Design, Automation and Test in Europe.
[6] Zoya Dyka,et al. Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization , 2016, SECITC.
[7] Ian T. Jolliffe,et al. Principal Component Analysis , 2002, International Encyclopedia of Statistical Science.