共 59 条
[1]
Abate Carmine, 2018, COMPUTER SECURITY FD
[2]
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I,
2016, 9665
:622-643
[3]
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:526-540
[4]
Jasmin: High-Assurance and High-Speed Cryptography
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1807-1823
[5]
Almeida JB, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P53
[6]
Almeida Jose Bacelar, 2019, ABS190404606 CORR
[7]
Towards Verified, Constant-time Floating Point Operations
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:1369-1382
[8]
On Subnormal Floating Point and Abnormal Timing
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:623-639
[9]
[Anonymous], 1994, INT WORKSH FAST SOFT
[10]
APPEL A, 2011, PROGRAMMING LANGUAGE, DOI DOI 10.1007/978-3-642-19718-5_1