Non-deterministic Processors
暂无分享,去创建一个
[1] Ralph Howard,et al. Data encryption standard , 1987 .
[2] Norman P. Jouppi,et al. Available instruction-level parallelism for superscalar and superpipelined machines , 1989, ASPLOS III.
[3] Craig S. K. Clapp,et al. Instruction-level Parallelism in AES Candidates , 1999 .
[4] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[5] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[6] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[7] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[8] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[9] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[10] Suresh Chari,et al. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .
[11] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[12] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[13] Morris J. Dworkin. Second Advanced Encryption Standard Candidate Conference , 1999 .
[14] L. Goubin,et al. DES and Differential Power Analysis , 1999 .
[15] Douglas Lewin,et al. Advanced computer architectures , 1992 .
[16] Neil Weste,et al. Principles of CMOS VLSI Design , 1985 .
[17] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[18] P. Kocher,et al. Differential power analysis, advances in cryptology-CRYPTO'99 , 1999 .
[19] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[20] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[21] Alexandru Nicolau,et al. Parallel processing: a smart compiler and a dumb machine , 1984, SIGP.
[22] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[23] Henk L. Muller,et al. Random Register Renaming to Foil DPA , 2001, CHES.