|
[1]
|
Kocher, P., Jaffe, J. and Jun, B. (1999) Differential Power Analysis. In: Wiener, M., Ed., Advances in Cryptolo-gy—CRYPTO’ 99. CRYPTO 1999. Lecture Notes in Computer Science, vol. 1666. Springer, Berlin, 388-397. [Google Scholar] [CrossRef]
|
|
[2]
|
Kocher, P.C. (1996) Timing Attacks on Implementations of Dif-fie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N., Ed., Advances in Cryptology—CRYPTO’ 96. CRYPTO 1996. Lecture Notes in Computer Science, vol. 1109, Springer, Berlin, 104-113. [Google Scholar] [CrossRef]
|
|
[3]
|
Kocher, P. (1999) Differential Power Analysis and Related Attacks. Annual International Cryptology Conference, Germany, 1999, 388-397.
|
|
[4]
|
Chari, S., Rao, J.R. and Rohatgi, P. (2002) Template Attacks. In: Kaliski, B.S., Koç, ç.K. and Paar, C., Eds., Cryptographic Hardware and Embedded Sys-tems—CHES 2002. Springer, Berlin. [Google Scholar] [CrossRef]
|
|
[5]
|
Schindler, W., Lemke, K. and Paar, C. (2005) A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao, J.R. and Sunar, B., Eds., Cryptographic Hardware and Embedded Systems—CHES 2005. Springer, Berlin, 30-46. [Google Scholar] [CrossRef]
|
|
[6]
|
Herbst, C., Oswald, E. and Mangard, S. (2006) An AES Smart Card Im-plementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F., Eds., ACNS. Volume 3989 of Lecture Notes in Computer Science. Springer, Berlin, 239-252. [Google Scholar] [CrossRef]
|
|
[7]
|
Rivain, M., Prouff, E. and Doget, J. (2009) Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. Cryptology ePrint Archive. http://eprint.iacr.org/2009/420
|
|
[8]
|
Rauzy, P., Guilley, S. and Najm, Z. (2013) Formally Proved Security of Assembly Code Against Leakage. IACR Cryptology ePrint Archive 2013, 554.
|
|
[9]
|
National Insti-tute of Standards and Technology (2001) FIPS-197: Advanced Encryption Standard.
http://www.itl.nist.gov/fipspubs/ .
|
|
[10]
|
Friedberg, I., Skopik, F., Settanni, G., et al. (2015) Combating Advanced Per-sistent Threats. Computers & Security, 48, 35-57. [Google Scholar] [CrossRef]
|
|
[11]
|
Vaswani, A., Shazeer, N., Parmar, N., et al. (2017) Attention Is All You Need. arXiv: 1706.03762.
|
|
[12]
|
Dosovitskiy, A., Beyer, L., Kolesnikov, A., et al. (2020) An Image Is Worth 16x16 Words: Transformers for Image Recognition at Scale. Proceed-ings of the International Conference on Computer Vision (ICCV), 2021, 6183-6192.
|
|
[13]
|
Standaert, F.X., Malkin, T.G. and Yung, M. (2009) A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A., Ed., Advances in Cryptology—EUROCRYPT 2009. EUROCRYPT 2009. Lecture Notes in Computer Science, vol. 5479. Springer, Berlin, 443–461. [Google Scholar] [CrossRef]
|