共 38 条
- [1] Aciiçmez O, 2007, LECT NOTES COMPUT SC, V4377, P271
- [2] Aciiçmez O, 2006, LECT NOTES COMPUT SC, V4307, P112
- [3] Aciiçmez O, 2010, LECT NOTES COMPUT SC, V6225, P110, DOI 10.1007/978-3-642-15031-9_8
- [4] Akdemir Kahraman, 2010, White paper
- [5] [Anonymous], 2012, Cross-VM Side Channels and Their Use to Extract Private Keys, Computer and communications security", p, DOI DOI 10.1145/2382196.2382230
- [6] [Anonymous], 1997, Handbook of Applied Cryptography
- [7] Apecechea G.I., 2014, IACR CRYPTOLOGY EPRI, V2014, P248
- [8] An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks [J]. 2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 75 - 84
- [9] BARRETT P, 1987, LECT NOTES COMPUT SC, V263, P311
- [10] Bonneau J, 2006, LECT NOTES COMPUT SC, V4249, P201