共 111 条
- [1] Kocher P C., Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C], Proc of the 16th Annual Int Cryptology Conf on Advances in Cryptology, pp. 104-113, (1996)
- [2] Zhang Yinqian, Cache side channels: State of the art and research opportunities[C], Proc of the 24th ACM SIGSAC Conf on Computer and Communications Security, pp. 2617-2619, (2017)
- [3] Aciicmez O, Schindler W, Koc C K., Cache based remote timing attack on the AES[C], Proc of the 7th Cryptographers' Track at the RSA Conf on Topics in Cryptology, pp. 271-286, (2007)
- [4] Bernstein D J., Cache-timing attacks on AES
- [5] Weiss M, Heinz B, Stumpf F., A cache timing attack on AES in virtualization environments[C], Proc of the 16th Int Conf on Financial Cryptography and Data Security, pp. 314-328, (2012)
- [6] Aciicmez O, Koc C K., Trace-driven cache attacks on AES[C], Proc of the 8th Int Conf on Information & Communications Security, pp. 112-121, (2006)
- [7] Zhang Yinqian, Juels A, Reiter M K, Et al., Cross-VM side channels and their use to extract private keys[C], Proc of the 19th ACM Conf on Computer and Communications Security, pp. 305-316, (2012)
- [8] Osvik D A, Shamir A, Tromer E., Cache attacks and countermeasures: The case of AES[C], Proc of the 6th Topics in Cryptology-the Cryptographers' Track at the RSA Conf, pp. 1-20, (2006)
- [9] Percival C., Cache missing for fun and profit
- [10] Ristenpart T, Tromer E, Shacham H, Et al., Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds[C], Proc of the 16th ACM Conf on Computer and Communications Security, pp. 199-212, (2009)