Author:
Chuengsatiansup Chitchanok,Genkin Daniel,Yarom Yuval,Zhang Zhiyuan
Publisher
Springer International Publishing
Reference67 articles.
1. Acıiçmez, O.: Yet another microarchitectural attack: exploiting I-cache. In: CSAW (2007)
2. Acıiçmez, O., Koç, Ç.K., Seifert, J.: Predicting secret keys via branch prediction. In: CT-RSA (2007)
3. Akshima, D.C., Ghosh, M., Goel, A., Sanadhya, S.K.: Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512. In: ICISC (2015)
4. Allan, T., Brumley, B.B., Falkner, K.E., van de Pol, J., Yarom, Y.: Amplifying side channels through performance degradation. In: ACSAC (2016)
5. AlTawy, R., Abdelkhalek, A., Youssef, A.M.: A meet-in-the-middle attack on reduced-round Kalyna-b/2b. IEICE Trans. Inf. Syst. 99-D(4), 1246–1250 (2016)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: SGX.Fail: How Stuff Gets eXposed;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
2. CacheFX: A Framework for Evaluating Cache Security;Proceedings of the ACM Asia Conference on Computer and Communications Security;2023-07-10
3. RSA Key Recovery from Digit Equivalence Information;Applied Cryptography and Network Security;2022