共 50 条
- [22] Remote Side-Channel Attacks on Anonymous Transactions PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2739 - 2756
- [23] Side-Channel Attacks on Mobile and Wearable Systems 2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
- [25] How to Compare Profiled Side-Channel Attacks? APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 485 - +
- [26] On the Feasibility of Side-Channel Attacks in a Virtualized Environment E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339
- [27] On the Correctness of an Approach against Side-Channel Attacks INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
- [28] Side-Channel Expectation-Maximization Attacks IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 774 - 799
- [29] Side-Channel Attacks and Machine Learning Approach 2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
- [30] A tutorial on physical security and side-channel attacks FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108