1. Remote Timing Attacks are Practical;Boneh,2003
2. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors;Coppens,2009
3. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems;Kocher,1996
4. A timing attack against RSA with Chinese remainder theorem;Schindler,2000
5. Cache games - bringing access-based cache attacks on AES to practice;Bangerter,2011