Author:
Molnar David,Piotrowski Matt,Schultz David,Wagner David
Publisher
Springer Berlin Heidelberg
Reference34 articles.
1. Agat, J.: Transforming Out Timing Leaks. In: Proceedings on the 27th ACM Symposium on the Principles of Programming Languages (2000)
2. Agat, J.: Type Based Techniques for Covert Channel Elimination and Register Allocation. PhD thesis, Chalmers University of Technology (2001)
3. Benini, L., Macii, A., Macii, E., Omerbegovic, E., Poncino, M., Pro, F.: A Novel Architecture for Power Maskable Arithmetic Units. In: Proceedings of the 13th ACM Great Lakes symposium on VLSI (2003)
4. Benini, L., Macii, A., Macii, E., Omerbegovic, E., Poncino, M., Pro, F.: Energy-aware Design Techniques for Differential Power Analysis Protection. In: Proceedings of the 40th conference on Design automation (2003)
5. Bernstein, D.J.: Cache-timing attacks on AES (2005),
http://cr.yp.to/papers.html#cachetiming
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献