Author:
Montasari Reza,Daneshkhah Alireza,Jahankhani Hamid,Hosseinian-Far Amin
Publisher
Springer International Publishing
Reference53 articles.
1. Acıiçmez O, Koç ÇK, Seifert J-P (2007) Predicting secret keys via branch prediction. In: Cryptographers track at the RSA conference. Springer, pp 225–242
2. Aweke ZB, Yitbarek SF, Qiao R, Das R, Hicks M, Oren Y, Austin T (2016) ANVIL: software-based protection against next-generation rowhammer attacks. ACM SIGPLAN Notices 51(4):743–755
3. Bernstein DJ (2005) Cache-timing attacks on AES
4. Bernstein DJ, Chou T, Schwabe P (2013) McBits: fast constant-time code-based cryptography. In: International workshop on cryptographic hardware and embedded systems. Springer, pp 250–272
5. Bernstein DJ, Schwabe P (2008) New AES software speed records. In: International conference on cryptology in India. Springer, pp 322–336
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献