1. O. Aciiçmez , J.-P. Seifert , and Ç. K. Koç . Predicting secret keys via branch prediction. Topics in Cryptology - CT-RSA 2007 , The Cryptographers' Track at the RSA Conference 2007, to appear. O. Aciiçmez, J.-P. Seifert, and Ç. K. Koç. Predicting secret keys via branch prediction. Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, to appear.
2. D. Brumley and D. Boneh . Remote Timing Attacks are Practical . Proceedings of the 12th Usenix Security Symposium , pages 1 -- 14 , 2003 . D. Brumley and D. Boneh. Remote Timing Attacks are Practical. Proceedings of the 12th Usenix Security Symposium, pages 1--14, 2003.
3. Y. Chen , P. England , M. Peinado , and B. Willman . High Assurance Computing on Open Hardware Architectures . Technical Report , MSR-TR- 2003 -20, 17 pages, Microsoft Corporation , March 2003. Available at: ftp://ftp.research.microsoft.com/pub/tr/tr-2003-20.ps Y. Chen, P. England, M. Peinado, and B. Willman. High Assurance Computing on Open Hardware Architectures. Technical Report, MSR-TR-2003-20, 17 pages, Microsoft Corporation, March 2003. Available at: ftp://ftp.research.microsoft.com/pub/tr/tr-2003-20.ps
4. Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
5. Statistics and secret leakage