Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Intel 64 and ia-32 architectures optimization reference manual (2009)
2. Bernstein, D.: Cache-timing attacks on AES. Technical report (2005)
3. Bernstein, D.J., Schwabe, P.: New AES software speed records (2008)
4. Bhaskar, R., Dubey, P., Kumar, V., Rudra, A., Sharma, A.: Efficient Galois field arithmetic on SIMD architectures. In: Proceedings of the 15th ACM Symposium on Parallelism in Algorithms and Architectures, pp. 256–257 (2003)
5. Biryukov, A.: A new 128-bit-key stream cipher: LEX. In: eSTREAM, ECRYPT Stream Cipher Project, Report 2005/013 (2005)
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: SGX.Fail: How Stuff Gets eXposed;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
2. Clueless: A Tool Characterising Values Leaking as Addresses;Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy;2022-10
3. Processor Security: Detecting Microarchitectural Attacks via Count-Min Sketches;IEEE Transactions on Very Large Scale Integration (VLSI) Systems;2022-07
4. Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation;Information Security and Privacy;2022
5. Accelerating DES and AES Algorithms for a Heterogeneous Many-core Processor;International Journal of Parallel Programming;2021-04-16