{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,9,6]],“日期-时间”:“2024-09-06T02:20:12Z”,“时间戳”:1725589212076},“引用-计数”:26,“发布者”:“IEEE”,“许可证”:[{“开始”:{“日期-零件”:[[2020,12,6]]],”日期-时间“:”2020-12-06T00:00:00 0Z“,”时间戳“:1607212800000},”内容版本“:”vor“,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[[2020,12,6]],“date-time”:“2020-12-06T00:00:00Z”,“timestamp”:1607212800000},“content-version”:“stm-asf”,“delay-in-days“:0,”URL“https:\\/doi.org\/10.1525 23\/policy-029“},{“开始”:{“日期部分”:[[2020,12,6]],“date-time”:“2020-12-06T00:00:00Z”,“timestamp”:1607212800000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-037”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”shortcontainer-title“:[],”published-print“:{”date-parts“:[2020,12,6]},“doi”:“10.1109\/wifs49906.2020.9360908”,“类型”:“procesdings-article”,“created”:{“date-parts”:[[2021,2,25]],“date-time”:“2021-02-25T21:12:41Z”,“timestamp”:1614287561000},“page”:“1-6”,“source”:”Crossref“,“is-referenced-by-count”:0,“title”:[“针对侧通道攻击的基于强化的分治策略”],“prefix”:“10.1109”,“author”:[{“给定”:“Shan”,“family”:“Jin”,”sequence“:“第一个”,“affiliation”:[]},{“given”:“Riccardo”,“family”:“Betati”,“sequence”:“additional”,“affaliation”:[]}],“member”:“263”,“reference”:[{“key”:”ref10“,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/WIFS.2018.8630771“},“key“:”ref11“,”first page“:“85”,“article-title”:“Efficient Stochastic Methods:Profiled Attacks Beyond 8”Bits“,”author“:”choudary“,”year“:“2014”,“journal-title”:“智能卡研究和高级应用国际会议”},{“journal-title“:“RIJNDAEL AES-高级加密标准的设计”,“年份”:“2002”,“author”:“daemen”,“key”:“ref12”},“DOI”:“10.1007\/978-3642-00730-9_16”},{“key”:“ref15”,“首页”:“393”,“article-title”:“代数边信道攻击”,“author”:“renauld”,“年份”:“2009”,“journal-title“:“信息安全与密码学国际会议(INSCRYPT’09)”}5“},{“article-title”:“通过SAT-Solvers转换和求解GF(2)上低阶多元多项式稀疏系统的有效方法”,“年份”:“2007”,“author”:“bard”,“key”:“ref17”},{“key“:”ref18“,”doi-asserted-by“:”publisher“,”doi“:”10.1007\/978-3662-48800-3_12“},”{“密钥”:“ref19”,“doi-assert-by”:“publisher”,“doi”:“10.1109\/MSP.2004.1267047”},{“key”:“ref4”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/978-3-540-28632-5_2”},{“key”:“ref5”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/s13389-011-0010-2”},{“key”:“ref8”,“doi asserted by”:“publisher”,“doi”:“10.1007\/115455262_3”},{“key”:“ref7”,“首页”:“253”,“文章标题”:“高效模板攻击”,“作者”:“choudary”,“年份”:“2013”,“期刊标题”:“国际智能卡研究与高级应用会议”},{“key”:“ref2”,“doi asserted by”:“publisher”,“doi”:“10.1109\/ICCPS.2016.7479068”},{“key”:“ref9”,“首页”:“165”,“article-title”:“关于高斯模型中边信道分析的准确成功率”,“author”:“rivain”,“year”:“2008”,“journal-title“:“第十五届密码学选定领域年会(SAC'08)”}:“10.1007\/3-540-44709-1_21”},{“key”:“ref20”,“首页”:“239”,“article-title”:“理解信念传播及其泛化”,“author”:“yedidia”,“year”:“2003”,“journal-title“:“探索新千年中的人工智能”}:“最优密钥枚举算法及其在边信道攻击中的应用”,“author”:“veyrat-charvillon”,“year”:“2012”,“journal-title”:“密码学选定领域国际会议”},{“article-title“:“从编码理论观点建模软分析边信道攻击”,“年份”:“2018”,“作者”:“guo”,“Key”:“ref24”}:“ref23”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TIFS.2017.2757440”},{“journal-title”:“BMJ”,“article-title“:“Pearson相关系数”,“年份”:“0”,“author”:“sedgwick”,“key”:“ref26”}:“2020 IEEE信息取证与安全国际研讨会(WIFS)”,“start”:{“date-parts”:[[2020,12,6]]},“location”:“New York,NY,USA”,“end”:{“date-parts”:[2020,12,11]]}},”container-title“:[”2020 IEEE国际信息取证和安全研讨会(WILS)“],”原文标题“:[],”链接“:[{”URL“:“http://\/xplorestaging.ieee.org\/ielx7\/9360831\/9360880.pdf?arnumber=9360908”,“内容类型”:“未指定”,“content-version”:“vor”,“intended-application”:“相似性检查”}],“存放”:{“日期部分”:[2022,6,30]],“日期时间”:“2022-06-30T15:17:51Z”,“时间戳”:1656602271000},“分数”:1,“资源”:{“主要”:{“URL”:“https:\/\/ieeexplore.iee.org\/document\/9360908\/”}},“副标题”:[],“短标题”:[],“已发布”:{“日期-部件”:[[2020,12,6]]},”引用计数“:26,”URL“:”http://\/dx.doi.org\/10.1009\/wifs49906.2020.9360908“,”关系“:{}”,“主题”:[]],“发布”:}“日期部件”:[2020,12 6]]}}