您当前的位置:
首页 >
文章列表页 >
Power model in power analysis attack
Papers | 更新时间:2024-06-05
    • Power model in power analysis attack

    • Journal on Communications   Vol. 33, Issue Z1, Pages: 276-281(2012)
    • DOI:10.3969/j.issn.1000-436x.2012.z1.037    

      CLC: TN918.1;TP309.1
    • Online First:2012-09

      Published:25 September 2012

    移动端阅览

  • Peng LUO, Deng-guo FENG, Yong-bin ZHOU. Power model in power analysis attack[J]. Journal on Communications, 2012, 33(Z1): 276-281. DOI: 10.3969/j.issn.1000-436x.2012.z1.037.

  •  
  •  

0

Views

513

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Hierarchical location-diversity-based low-delay anonymous communication framework
Survey on chaos-based low probability of interception communication technology
Concrete constructions of 2-resilient rotation symmetric Boolean functions with 7 variables
Survey on privacy protection indoor positioning
Survey of capacity limits and implementation techniques in wireless covert communication

Related Author

CHEN Xin1
HU Hua-ping1
LIU Bo1
XIAO Feng-tao1
HUANG Zun-guo1
ZHOU Ang
WANG Shilian
CHEN Weiyu

Related Institution

School of Computer Science, National University of Defense Technology
61070 Army
College of Electronic Science and Technology, National University of Defense Technology
Beijing Institute of Astronautical Systems Engineering
College of Mathematics and Information Science,Henan Normal University
0