Author:
Brumley Billy Bob,Tuveri Nicola
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Lecture Notes in Computer Science;P.C. Kocher,1996
2. Brumley, D., Boneh, D.: Remote timing attacks are practical. In: Proceedings of the 12th USENIX Security Symposium (2003)
3. Brumley, D., Boneh, D.: Remote timing attacks are practical. Computer Networks 48, 701–716 (2005)
4. Lecture Notes in Computer Science;V.S. Miller,1986
5. Koblitz, N.: Elliptic curve cryptosystems. Math. Comp. 48, 203–209 (1987)
Cited by
130 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献