CORC

浏览/检索结果: 共7条,第1-7条 帮助

已选(0)清除 条数/页:   排序方式:
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 12
作者:  Tang Ming;  Wang Pengbo;  Ma Xiaoqi;  Chang Wenjie;  Zhang Huanguo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 卷号: 37, 期号: 12
作者:  Tang Ming;  Li Yanbin;  Zhao Dongyan;  Li Yuguang;  Yan Fei
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
A Generic TC-Based Method to Find the Weakness in Different Phases of Masking Schemes 期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 卷号: 23, 期号: 5
作者:  Tang, Ming;  Li, Yuguang;  Li, Yanbin;  Wang, Pengbo;  Zhao, Dongyan
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
High-Performance Noninvasive Side-Channel Attack Resistant ECC Coprocessor for GF(2(m)) 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2017
Liao, Kai; Cui, Xiaoxin; Liao, Nan; Wang, Tian; Yu, Dunshan; Cui, Xiaole
收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
PFD-A Flexible Higher-Order Masking Scheme 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 卷号: 36, 期号: 8
作者:  Tang, Ming;  Guo, Zhipeng;  Heuser, Annelie;  Ren, Yanzhen;  Li, Jie
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
polar differential power attacks and evaluation 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 7, 页码: 1588-1604
Tang Ming; Qiu ZhenLong; Gao Si; Yi Mu; Liu ShuBo; Zhang HuanGuo; Jin YingZhen
收藏  |  浏览/下载:15/0  |  提交时间:2013/09/17
an new anti-spa algorithm of naf scalar multiplication used in ecc 期刊论文
International Journal of Advancements in Computing Technology, 2012, 卷号: 4, 期号: 20, 页码: 692-700
Luo Peng; Feng Dengguo; Zhou Yongbin
收藏  |  浏览/下载:16/0  |  提交时间:2013/09/17


©版权所有 ©2017 CSpace - Powered by CSpace