共 50 条
- [42] Security audit in cloud-based server by using encrypted data AES-256 and SHA-256 INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
- [43] Hardening AES Hardware Implementations Against Fault and Error Inject Attacks PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 499 - 502
- [44] Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1861 - 1875
- [45] Experimental Implementation of DPA Attacks on AES Design with Flash-based FPGA Technology 2009 6TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES, VOLS 1 AND 2, 2009, : 964 - +
- [48] Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256 INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 : 3 - 23
- [50] Hardware Implementation and Comparison of CRA and TRA when Trying to Recover the AES-128 Key 2020 55TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION, COMMUNICATION AND ENERGY SYSTEMS AND TECHNOLOGIES (IEEE ICEST 2020), 2020, : 256 - 258