1. M. Abadi, M. Burrows, M. Manasse, T. Wobber, Moderately hard, memory-bound functions. ACM Trans. Internet Technol.
5(2), 299–327 (2005)
2. O. Acıiçmez, Yet another microarchitectural attack: exploiting I-cache, in IACR Cryptology ePrint Archive, report 2007/164 (2007).
http://eprint.iacr.org/2007/164
3. O. Acıiçmez, Ç.K. Koç, Trace driven cache attack on AES. IACR Cryptology ePrint Archive, report 2006/138 (2006).
http://eprint.iacr.org/2006/138
; full version of [4]
4. Lecture Notes in Computer Science;O. Acıiçmez,2006
5. O. Acıiçmez, Ç.K. Koç, J.-P. Seifert, On the power of simple branch prediction analysis. IACR Cryptology ePrint Archive, report 2006/351 (2006)