[1] |
SUN Jiayi, WEI Yongzhuang.
Template Attacks Against Lightweight Block Cipher Algorithm DoT
[J]. Computer Engineering, 2021, 47(3): 155-159,165.
|
[2] |
WANG Junnian, ZHU Bin, YU Wenxin, WANG Wan, HU Fanliang.
Side Channel Analysis Attack Based on Deep Learning LSTM
[J]. Computer Engineering, 2021, 47(10): 140-146.
|
[3] |
SONG An, WANG Qin, GU Dawu, GUO Zheng, LIU Junrong, ZHANG Chi.
FPGA-based Collection Method for Power Information of Clock Synchronization
[J]. Computer Engineering, 2020, 46(6): 115-121.
|
[4] |
ZHU Wenfeng, WANG Qin, GUO Zheng, LIU Junrong.
Research on Attacks Method for Block Ciphers
[J]. Computer Engineering, 2020, 46(1): 102-107,113.
|
[5] |
ZHANG Aiping,LI Demin,ZHANG Guanglin,GUO Chang.
Vehicular Collision Warning Algorithm Based on Time to Collision Point Estimation
[J]. Computer Engineering, 2019, 45(2): 53-57,63.
|
[6] |
WANG Sixiang,ZHANG Lei,DUAN Xiaoyi,CUI Qi,GAO Xianwei.
Correlation Power Analysis Attack Based on Hilbert-Huang Transform Filtering Pretreatment
[J]. Computer Engineering, 2018, 44(7): 160-165,171.
|
[7] |
LING Hang,WU Zhen,DU Zhibo,WANG Min,RAO Jintao.
Algebraic Side Channel Attack Against EPCBC Based on Hamming Weight
[J]. Computer Engineering, 2017, 43(8): 156-160,168.
|
[8] |
LIU Yubing,XU Sen,SHAN Yonglong.
Research on Equipment Power Consumption Acquisition Method for USBKey
[J]. Computer Engineering, 2016, 42(1): 66-70,76.
|
[9] |
ZHU Jialiang,WEI Yongzhuang.
Trace Driven Cache Attack on LBlock Algorithm
[J]. Computer Engineering, 2015, 41(5): 153-158.
|
[10] |
TAO Wenqing,GU Xingyuan,LI Jing.
Power Consumption Analysis Method Based on Data Encryption Standard Mask
[J]. Computer Engineering, 2015, 41(5): 133-138.
|
[11] |
BAO Si-gang,GU Hai-hua.
Fault Attack on BLS Short Signature
[J]. Computer Engineering, 2014, 40(8): 112-115.
|
[12] |
DIAO Ti-Hua, DIAO Jia, HAN Mao.
An Improved Window Algorithm for RSA Against Side Channel Attack
[J]. Computer Engineering, 2013, 39(6): 150-153.
|
[13] |
TAO Jian-Bei, ZHANG Chao.
Side Channel Attack Risk Evaluation Model Based on Mutual Information Game
[J]. Computer Engineering, 2012, 38(15): 12-15.
|
[14] |
TUN Heng-Xu, CHEN Kai-Ya, DENG Gao-Meng, JU Cheng.
Instruction Analysis for Crypto Chip Based on Power Consumption Leakage
[J]. Computer Engineering, 2011, 37(7): 130-132,135.
|
[15] |
TIAN Jun-Jian, KOU Ying-Zhan, CHEN Cai-Sen, MA Xiu-Feng.
Research of Differential Timing Attack on RSA Public-key Cryptographic Algorithm
[J]. Computer Engineering, 2011, 37(5): 146-148.
|