1. Aciicmez O. and Koh C. 2006. Trace-driven cache attacks on aes. Cryptology ePrint Archive rep. 2006/138. Aciicmez O. and Koh C. 2006. Trace-driven cache attacks on aes. Cryptology ePrint Archive rep. 2006/138.
2. ARM. 2010--2011. Cortex-r5 and cortex-r5f: A technical reference manual revision r1p1. http://infocenter.arm.com/help/topic/com.arm.doc.ddi0460c/DDI0460C_cortexr5_trm.pdf (accessed 7/11). ARM. 2010--2011. Cortex-r5 and cortex-r5f: A technical reference manual revision r1p1. http://infocenter.arm.com/help/topic/com.arm.doc.ddi0460c/DDI0460C_cortexr5_trm.pdf (accessed 7/11).
3. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice
4. Bernstein D. 2005. Cache-timing attacks on AES. http://cr.yp.to/antiforgery/cachetiming-20050414.pdf. Bernstein D. 2005. Cache-timing attacks on AES. http://cr.yp.to/antiforgery/cachetiming-20050414.pdf.