Computer Science ›› 2013, Vol. 40 ›› Issue (6): 116-118.
Previous Articles Next Articles
SHAO Qi-feng,TANG Xiao-wei,FANG Ming and YANG Tian-chi
[1] 吴克辉.基于汉明重的PRESENT密码代数旁路攻击[J].计算机科学,2011,2(38):53-56 [2] 姚剑波.层次化的侧信道攻击风险量化评估模型[J].计算机工程与应用,2011,1(3):131-133 [3] 姚剑波,张涛.基于互信息博弈的侧信道攻击安全风险评估[J].计算机科学,2012,6(39):69-71 [4] JoyeM,Paillier P,Schoenmakers B.On second-order differential power analysis[C]∥Proc of Cryptograph ic Hardware and Embedded Systems (CHES 2005),LNCS 3659.Springer-Verlag,2005:293-308 [5] 童元满.基于细粒度任务调度的防功耗分析模幂方法[J].计算机工程,2006,2:31-33 [6] Veyrat-Charvillon N,Standaert F-X.Mutual information analysis:how,when and why?[C]∥The Proceedings of CHES 2009,Lausanne,Switzerland,September 2009.Lecture Notes in Computer Science,vol.5747,Springer,Berlin,2009:429-443 [7] Standaert F-X,Veyrat-Charvillon N,Oswald E,et al.The world is not enough:another look on second-order DPA[C]∥The Proceedings of Asiacrypt 2010,Singapore,December 2010.Lecture Notes in Computer Science,vol.6477.Springer,Berlin,2010:112-129 [8] Rivain M,Dottax E,Prouff E.Block ciphers implementations provably secure against second-orderside-channel analysis[C]∥The Proceedings of FSE 2008,Lausanne,Switzerland,February 2008.LectureNotes in Computer Science,vol.5086.Springer,Berlin,2008:127-143 |
No related articles found! |
|