1. – (no editor): 9th IEEE symposium on application specific processors. Institute of Electrical and Electronics Engineers (2011). See [33]
2. Aciiçmez, O., Brumley, B.B., Grabher, P.: New results on instruction cache attacks. In: CHES 2010 [31], pp. 110–124 (2010). Citations in this document: §1
3. ARM Limited: Cortex-A8 technical reference manual, revision r3p2 (2010), http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0344k/index.html . Citations in this document: §2
4. Bernstein, D.J.: Floating-point arithmetic and message authentication (1999), http://cr.yp.to/papers.html#hash127 . Citations in this document: §4, §4, §4, §4
5. Bernstein, D.J.: The Poly1305-AES message-authentication code. In: FSE 2005 [20], pp. 32–49 (2005), http://cr.yp.to/papers.html#poly1305 . Citations in this document: §1, §4, §4