共 31 条
[1]
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I,
2016, 9665
:622-643
[2]
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:526-540
[3]
Almeida JB, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P53
[4]
Almeida Jose Bacelar, 2017, P 24 ACM C COMP COMM
[5]
Andrysco Marc, 2015, SECURITY PRIVACY
[6]
[Anonymous], 2018, ARXIV E PRINTS
[7]
BARRETT P, 1987, LECT NOTES COMPUT SC, V263, P311
[8]
Barthe G, 2007, LECT NOTES COMPUT SC, V4734, P2
[9]
Verified Translation Validation of Static Analyses
[J].
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2017,
:405-419
[10]
System-level Non-interference for Constant-time Cryptography
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1267-1279