共 40 条
- [31] Page D., Theoretical use of cache memory as a cryptanalytic side-channel, IACR Cryptology ePrint Archive, 2002, (2000)
- [32] Percival C.
- [33] Ron D., Shamir A., Quantitative analysis of the full Bitcoin transaction graph
- [34] Schnorr C.-P., Euchner M., Lattice basis reduction: Improved practical algorithms and solving subset sum problems, FCT 1991.LNCS, 529, pp. 68-85, (1991)
- [35] Stinson D.R., Some baby-step giant-step algorithms for the low Hamming weight discrete logarithm problem, Math. Comput, 71, 237, pp. 379-391, (2002)
- [36] Tromer E., Osvik D.A., Shamir A., Efficient cache attacks in AES, and countermeasures, Journal of Cryptology, 23, 2, pp. 37-71, (2010)
- [37] Waldspurger C.A., Memory resource management in VMware ESX Server, Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, pp. 181-194, (2002)
- [38] Yarom Y., Benger N., Recovering OpenSSL ECDSA nonces using the Flush+Reload cache side-channel attack. Cryptology ePrint Archive, Report 2014/140, (2014)
- [39] Yarom Y., Falkner K., FLUSH+RELOAD: A high resolution, low noise, L3 cache sidechannel attack, Proceedings of the 23rd USENIX Security Symposium (to appear, (2014)
- [40] Zhang Y., Jules A., Reiter M.K., Ristenpart T., Cross-VM side channels and their use to extract private keys, Proceedings of the 19th ACM Conference on Computer and Communication Security, Raleigh, pp. 305-316, (2012)