1. O. Aciiçmez, Ç.K. Koç and J.-P. Seifert, On the power of simple branch prediction analysis, in: ACM Symposium on Information, Computer and Communications Security, ACM, 2007, pp. 312–320.
2. J. Almeida, M. Barbosa, G. Barthe, A. Blot, B. Grégoire, V. Laporte, T. Oliveira, H. Pacheco, B. Schmidt and P.-Y. Strub, Jasmin: High-assurance and high-speed cryptography, in: CCS 2017 – Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017.
3. J.B. Almeida, M. Barbosa, G. Barthe, F. Dupressoir and M. Emmi, Verifying constant-time implementations, in: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10–12, 2016, 2016, pp. 53–70.
4. On Subnormal Floating Point and Abnormal Timing
5. Verification of a cryptographic primitive: SHA-256;Appel;ACM Transactions on Programming Languages and Systems (TOPLAS),2015