To construct high level secure communication system: CTMI is not enough
暂无分享,去创建一个
Zheng Guo | Dawu Gu | Junrong Liu | Haifeng Zhang | Sen Xu | Haihua Gu | Kaiyu Zhang | Xiangjun Lu | Aidong Chen | Dawu Gu | Haihua Gu | Junrong Liu | Xiangjun Lu | Haifeng Zhang | Zheng Guo | Sen Xu | Aidong Chen | Kaiyu Zhang
[1] Michael A. Temple,et al. Improving cross-device attacks using zero-mean unit-variance normalization , 2012, Journal of Cryptographic Engineering.
[2] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[3] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[4] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[5] Joos Vandewalle,et al. Machine learning in side-channel analysis: a first study , 2011, Journal of Cryptographic Engineering.
[6] François-Xavier Standaert,et al. Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages , 2008, CHES.
[7] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[8] Guillaume Fumaroli,et al. Blinded Fault Resistant Exponentiation , 2006, FDTC.
[9] Lejla Batina,et al. Differential Cluster Analysis , 2009, CHES.