[1]
“Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning”, TCHES, vol. 2024, no. 3, pp. 472–499, Jul. 2024, doi: 10.46586/tches.v2024.i3.472-499.