1. AMD64 ArchitectureProgrammer’s Manual Volume 2: System Programming;AMD.;AMD Documentation,2021
2. PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
3. Thomas Bourgeat , Jules Drean , Yuheng Yang , Lillian Tsai , Joel S. Emer , and Mengjia Yan . 2020 . CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches. In 53rd Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2020 , Athens, Greece , October 17-21, 2020. IEEE, 1110–1123. https://doi.org/10.1109/MICRO50266.2020.00092 10.1109/MICRO50266.2020.00092 Thomas Bourgeat, Jules Drean, Yuheng Yang, Lillian Tsai, Joel S. Emer, and Mengjia Yan. 2020. CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches. In 53rd Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2020, Athens, Greece, October 17-21, 2020. IEEE, 1110–1123. https://doi.org/10.1109/MICRO50266.2020.00092
4. Samira Briongos , Pedro Malagon , Jose M. Moya , and Thomas Eisenbarth . 2020 . RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks . In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association , 1967–1984. https://www.usenix.org/conference/usenixsecurity20/presentation/briongos Samira Briongos, Pedro Malagon, Jose M. Moya, and Thomas Eisenbarth. 2020. RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1967–1984. https://www.usenix.org/conference/usenixsecurity20/presentation/briongos
5. Remote timing attacks are practical