Improved Leakage Model Based on Genetic Algorithm
暂无分享,去创建一个
An Wang | Zhenbin Zhang | Liji Wu | Zhaoli Mu
[1] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[2] L. Darrell Whitley,et al. The GENITOR Algorithm and Selection Pressure: Why Rank-Based Allocation of Reproductive Trials is Best , 1989, ICGA.
[3] Pankaj Rohatgi,et al. Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.
[4] Heinz Mühlenbein,et al. Optimal Interaction of Mutation and Crossover in the Breeder Genetic Algorithm , 1993, ICGA.
[5] Jean-Sébastien Coron,et al. Statistics and secret leakage , 2000, TECS.
[6] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[7] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[8] Rita Mayer-Sommer,et al. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards , 2000, CHES.
[9] Thomas S. Messerges,et al. Investigations of Power Analysis Attacks on Smartcards , 1999, Smartcard.
[10] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.