Subject
Law,General Computer Science
Reference55 articles.
1. Chipyard: integrated design, simulation, and implementation framework for custom SoCs;Amid;IEEE Micro,2020
2. Did we learn from LLC side channel attacks? a cache leakage detection tool for crypto libraries;Apecechea;ArXiv,2017
3. Bouder H.L., Lashermes R., Linge Y., Robisson B., Tria A. A unified formalism for physical attacks 2014.
4. Brier E., Clavier C., Olivier F. Correlation power analysis with a leakage model. In: Joye M., Quisquater J.J., Eds. Cryptographic hardware and embedded systems - CHES 2004, vol. 3156, Berlin, Heidelberg: Springer Berlin Heidelberg; 2004, p. 16–29. doi:10.1007/978-3-540-28632-5_2.
5. Remote timing attacks are still practical;Brumley,2011
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献