[1] |
毛保磊, 慕德俊, 胡伟, 等. RSA时间信道滑动窗口攻击方法及量化分析[J]. 西安电子科技大学学报, 2017,44(5):114-120.
|
|
MAO Baolei, MU Dejun, HU Wei, et al. Quantitative Analysis of Sliding Windows Attack for the RSA Timing Channel[J]. Journal of Xidian University, 2017,44(5):114-120.
|
[2] |
秦茂源, 慕德俊, 胡伟, 等. 硬件安全门级细粒度形式化验证方法[J]. 西安电子科技大学学报, 2018,45(5):143-148.
|
|
QIN Maoyuan, MU Dejun, HU Wei, et al. Fine-granularity Gate Level Formal Verification Method for Hardware Security[J]. Journal of Xidian University, 2018,45(5):143-148.
|
[3] |
OPPERMANN J, SOMMER L, WEBER L, et al. SkyCastle: a Resource-aware Multi-loop Scheduler for High-level Synconfproc [C]//Proceedings of the 2019 International Conference on Field-Programmable Technology. Piscataway: IEEE, 2019: 1-9.
|
[4] |
GARCIA P, BHOWMIK D, STEWART R, et al. Optimized Memory Allocation and Power Minimization for FPGA-based Image Processing[J]. Journal of Imaging, 2019,5(1):701-723.
|
[5] |
GIAMBLANCO N V, ANDERSON J H. A Dynamic Memory Allocation Library for High-level Synconfproc[C]// Proceedings of the 2019 29th International Conference on Field-Programmable Logic and Applications. Piscataway: IEEE, 2019: 314-320.
|
[6] |
CHOI Y K, CONG J. HLS-based Optimization and Design Space Exploration for Applications with Variable Loop Bounds[C]// Proceedings of the 2018 IEEE/ACM International Conference on Computer-Aided Design. Piscataway: IEEE, 2018: a103.
|
[7] |
KANEWALA U, GAMLATH K, RAMANAYAKE H, et al. Power-aware High-level Synconfproc Flow for Mapping FPGA Designs[C]// Proceedings of the 2019 5th International Multidisciplinary Moratuwa Engineering Research Conference. Piscataway: IEEE, 2019: 228-233.
|
[8] |
SICHANI A S, MORENO W A. Mathematical Model for Glitch Power Consumption to Study Its Implication on Power Analysis Attacks[C]// Proceedings of the 2018 9th Latin American Symposium on Circuits & Systems. Piscataway: IEEE, 2018: 1-4.
|
[9] |
PEETERS E, STANDAERT F X, QUISQUATER J J. Power and Electromagnetic Analysis: Improved Model, Consequences and Comparisons[J]. Elsevier Integration the Very Large Scale Integration Journal, 2007,40(1):52-60.
|
[10] |
SCIONTI A, CICCIA S, TERZO O, et al. Chip-to-cloud: An Autonomous and Energy Efficient Platform for Smart Vision Applications[C]// Proceedings of the 2019 Design, Automation and Test in Europe Conference and Exhibition. Piscataway: IEEE, 2019: 492-497.
|
[11] |
MANGARD S, OSWALD E, POPP T. Power Analysis Attacks: Revealing the Secrets of Smart Cards[M]. Heidelberg: Springer, 2008.
|
[12] |
ZHANG L, HU W, ARDESHIRICHAM A, et al. Examining the Consequences of High-level Synconfproc Optimizations on Power Side-channel[C]// Proceedings of the 2018 Design, Automation and Test in Europe Conference and Exhibition. Piscataway: IEEE, 2018: 1167-1170.
|
[13] |
STANDAERT F X. How (not) to Use Welch's T-test in Side-channel Security Evaluations[C]// Proceedings of the 2018. International Conference on Smart Card Research and Advanced Applications. Cham: Springer, 2018: 65-79.
|
[14] |
GUNTUR H, ISHII J, SATOH A. Side-channel Attack User Reference Architecture Board SAKURA-G[C]// Proceedings of the 2014 IEEE 3rd Global Conference on Consumer Electronics. Piscataway: IEEE, 2014: 271-274.
|
[15] |
RAMESH C, PATIL S B, DHANUSKODI S N, et al. FPGA Side Channel Attacks without Physical Access[C]// Proceedings of the 2018 26th IEEE International Symposium on Field-programmable Custom Computing Machines. Piscataway: IEEE, 2018: 45-52.
|