1. Lecture Notes in Computer Science;O. Acıiçmez,2006
2. Bernstein, D.J.: Cache-timing attacks on AES. Technical Report, 37 pages (April 2005), Available at:
http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
3. Brumley, D., Boneh, D.: Remote Timing Attacks are Practical. In: Proceedings of the 12th Usenix Security Symposium, pp. 1–14 (2003)
4. Chen, Y., England, P., Peinado, M., Willman, B.: High Assurance Computing on Open Hardware Architectures. Technical Report, MSR-TR-2003-20, 17 pages, Microsoft Corporation (March 2003), Available at:
ftp://ftp.research.microsoft.com/pub/tr/tr-2003-20.ps
5. Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity. IEEE Transactions on Computers 53(6), 760–768 (2004)