1. O. Aciicmez, W. Schindler and C. Koc, Cache based remote timing attack on the AES, in Topics in Cryptology – CT-RSA 2007, M. Abe (Ed.), Springer-Verlag, Berlin, Heidelberg, Germany, pp. 271–286, 2007.
2. D. Agrawal, B. Archambeault, J. Rao and P. Rohatgi, The EM side-channel(s), Proceedings of the Fourth International Workshop on Cryptographic Hardware and Embedded Systems, pp. 29–45, 2003.
3. C. Arnold, J. Butts and K. Thirunarayan, Strategies for combating sophisticated attacks, Journal of Information Warfare, vol. 12(1), 2013.
4. Z. Basnight, J. Butts, J. Lopez and T. Dube, Analysis of programmable logic controller firmware for threat assessment and forensic investigation, Journal of Information Warfare, vol. 12(2), 2013.
5. D. Brumley and D. Boneh, Remote timing attacks are practical, Proceedings of the Twelfth USENIX Security Symposium, article no. 1, 2003.