Generalizing the Hough transform to detect arbitrary shapes, Pattern Recognition, vol.13, issue.2, pp.111-122, 1981. ,
DOI : 10.1016/0031-3203(81)90009-1
URL : https://urresearch.rochester.edu/fileDownloadForInstitutionalItem.action?itemId=13504&itemFileId=31267
Speeded-Up Robust Features (SURF), Computer Vision and Image Understanding, vol.110, issue.3, pp.346-359, 2008. ,
DOI : 10.1016/j.cviu.2007.09.014
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.738
Correlation Power Analysis with a Leakage Model, Proceedings of 6th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 3156 in Lecture Notes in Computer Science, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Numerical analysis, 2004. ,
Improving the DPA attack using Wavelet,transform, NIST Physical Security Testing Workshop, 2005. ,
Differential Power Analysis in the Presence of Hardware Countermeasures, Proceedings of 2nd International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 1965 in Lecture Notes in Computer Science, pp.252-263, 2000. ,
DOI : 10.1007/3-540-44499-8_20
Differential Power Analysis, Advances in Cryptology: Proceedings of CRYPTO'99, number 1666 in Lecture Notes in Computer Science, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
Object recognition from local scale-invariant features, Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999. ,
DOI : 10.1109/ICCV.1999.790410
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.4065
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security, 2007. ,
Improving Differential Power Analysis by Elastic Alignment, Lecture Notes in Computer Science, vol.26, pp.104-119, 2011. ,
DOI : 10.1007/978-3-642-00730-9_16