[1]
Wouters, L. et al. 2020. Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2020, 3 (Jun. 2020), 147–168. DOI:https://doi.org/10.13154/tches.v2020.i3.147-168.