|
[1]
|
Chari, S., Rao, J.R. and Rohatgi, P. (2003) Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K. and Paar, C., Eds., Crypto-graphic Hardware and Embedded Systems—CHES 2002, Lecture Notes in Computer Science, Vol. 2523, Springer, Berlin, 13-28. [Google Scholar] [CrossRef]
|
|
[2]
|
Kocher, P. (1999) Differential Power Analysis and Related Attacks. Annual International Cryptology Conference, 388-397. [Google Scholar] [CrossRef]
|
|
[3]
|
夏璇, 陈柏沩, 钟卫东. 侧信道攻击与防御概述[J]. 科学与信息化, 2020(35): 57.
|
|
[4]
|
Schindler, W., Lemke, K. and Paar, C. (2005) A Stochastic Model for Differential Side Chan-nel Cryptanalysis. In: Rao, J.R. and Sunar, B., Eds., Cryptographic Hardware and Embedded Systems—CHES 2005, Lecture Notes in Computer Science, Vol. 3659, Springer, Berlin, 30-46. [Google Scholar] [CrossRef]
|
|
[5]
|
Siddiqui, S., Khan, M.S., Ferens, K. and Kinsner, W. (2016) Detecting Advanced Persistent Threats Using Fractal Dimension based Machine Learning Classification. Proceedings of the 2016 ACM on International Workshop on Security and Privacy Analytics, New Orleans, 11 March 2016, 64-69. [Google Scholar] [CrossRef]
|
|
[6]
|
Vaswani, A., Shazeer, N., Parmar, N., et al. (2017) Attention Is All You Need. ArXiv: 1706.03762.
|
|
[7]
|
Jain, R. (2001) Advanced Encryption Standard (AES). Washington University in St. Louis, Saint Louis.
|
|
[8]
|
Friedberg, I., Skopik, F., Settanni, G. and Fiedler, R. (2015) Combating Advanced Persis-tent Threats: From Network Event Correlation to Incident Detection. Computers & Security, 48, 35-57. [Google Scholar] [CrossRef]
|
|
[9]
|
Tay, Y., Dehghani, M., Bahri, D. and Metzler, D. (2022) Efficient Transformers: A Survey. ACM Computing Surveys, 55, Article No. 109. [Google Scholar] [CrossRef]
|
|
[10]
|
Devlin, J., Chang, M.-W., Lee, K. and Toutanova, K. (2019) Bert: Pre-Training of Deep Bidirectional Transformers for Language Understanding. Proceedings of NAACL-HLT 2019, Min-neapolis, 2-7 June 2019, 4171-4186.
|
|
[11]
|
Dosovitskiy, A., Beyer, L., Kolesnikov, A., et al. (2021) An Image Is Worth 16x16 Words: Transformers for Image Recognition at Scale.
|
|
[12]
|
Martinasek, Z., Dzurenda, P. and Malina, L. (2016) Profiling Power Analysis Attack Based on MLP in DPA Contest V4.2. 2016 39th International Conference on Tele-communications and Signal Processing, Vienna, 27-29 June 2016, 223-226. [Google Scholar] [CrossRef]
|
|
[13]
|
Martinasek, Z., Hajny, J. and Malina, L. (2014) Optimization of Power Analysis Using Neural Network. In: Francillon, A. and Rohatgi, P., Eds., Smart Card Research and Advanced Applications, CARDIS 2013, Lecture Notes in Computer Science, Vol. 8419, Springer, Cham, 94-107. [Google Scholar] [CrossRef]
|
|
[14]
|
He, K.M., Zhang, X.Y., Ren, S.Q. and Sun, J. (2016) Deep Residual Learning for Image Recognition. 2016 IEEE Conference on Computer Vision and Pattern Recognition, Las Ve-gas, 27-30 June 2016, 770-778. [Google Scholar] [CrossRef]
|
|
[15]
|
Jaderberg, M., Simonyan, K., Zisserman, A., et al. (2015) Spatial Transformer Networks. MIT Press, Cambridge, Massachusetts.
|