共 141 条
[1]
Aciicmez O., 2009, Cryptographic Engineering, P475, DOI [10.1007/978-0-387-71817-0_18, 10.1007/978-0-387-71817, DOI 10.1007/978-0-387-71817]
[2]
Aciiçmez O, 2007, CSAW'07: PROCEEDINGS OF THE 2007 ACM COMPUTER SECURITY ARCHITECTURE WORKSHOP, P11
[3]
Aciiçmez O, 2007, LECT NOTES COMPUT SC, V4377, P225
[4]
Aciiçmez O, 2010, LECT NOTES COMPUT SC, V6225, P110, DOI 10.1007/978-3-642-15031-9_8
[5]
Aciiçqmez O, 2008, LECT NOTES COMPUT SC, V4964, P256, DOI 10.1007/978-3-540-79263-5_16
[6]
Countermeasures against branch target buffer attacks
[J].
WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS,
2007,
:75-+
[7]
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:526-540
[8]
An HY, 2016, IEEE C ELECTR PERFOR, P87, DOI 10.1109/EPEPS.2016.7835424
[9]
On Subnormal Floating Point and Abnormal Timing
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:623-639
[10]
[Anonymous], EVOLUTION CPU TOO MU