1. P. C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Advances in Cryptology--- CRYPTO 1996 (LNCS 1109). Heidelberg, Germany: Springer, 1996, pp. 104--113.
2. P. C. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Advances in Cryptology---CRYPTO 1999 (LNCS 1666). Heidelberg, Germany: Springer, 1999, pp. 388--397.
3. E. Tromer, D. A. Osvik, and A. Shamir, "Efficient cache attacks on AES, and countermeasures," J. Cryptol., vol. 23, no. 1, pp. 37--71, 2010.
4. Y. Yarom and K. Falkner, "FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack," in Proc. USENIX Security Symp., San Diego, CA, USA, 2014, pp. 719--732.
5. P. Pessl, D. Gruss, C. Maurice, M. Schwarz, and S. Mangard, "DRAMA: Exploiting DRAM addressing for cross-CPU attacks," in Proc. USENIX Security Symp., 2016, pp. 565--581.