|
[1]
|
Kocher, P.C. (1996) Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. International Cryptology Conference on Advances in Cryptology, 1109, 104-113.
|
|
[2]
|
Kelsey, J., Schneier, B., Wagner, D., et al. (1998) Side Channel Cryptanalysis of Product Ciphers. European Symposium on Research in Computer Security, Louvain-La-Neuve, 16-18 September 1998, 97-110.
|
|
[3]
|
Page, D. (2002) Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. Technical Report CSTR-02-003, Department of Computer Science, University of Bristol.
http://www.cs.bris.ac.uk/Publications/pub_info.jsp?id=1000625
|
|
[4]
|
Wu, W.L., He, Y.P., Feng, D.G. and Qing, S.H. (2002) Power Attack of Mars and Rijndael. Journal of Software, 13, 532-536. (In Chinese with English Abstract) http://www.jos.org.cn/1000-9825/13/532.htm
|
|
[5]
|
Zhou, Y.B. and Feng, D.G. (2005) Side-Channel Attacks: Ten Years after Its Publication and the Impacts on Cryptographic Module Security Testing. Proceedings of the NIST Physical Security Workshop, 1-34.
|
|
[6]
|
Hou, F.Y., Gu, D.W. and Lin, X.Y. (2007) Cache-Based Attacks against AES: Research Progress. Information Security and Communications Privacy, 8, 41-43. (In Chinese with English Abstract)
|
|
[7]
|
Deng, G.M., Zhao, Q., Zhang, P. and Chen, K.Y. (2008) Cache Hit Side Channel Attack Based on AES. Computer Engineering, 34, 113-114. (In Chinese with English Abstract)
|
|
[8]
|
Bonneau, J. and Mironov, I. (2006) Cache-Collision Timing Attacks against AES. In: Goubin, L. and Matsui, M., Eds., Proceedings of the Cryptographic Hardware and Embedded Systems (CHES 2006), LNCS 4249, Berlin, Springer-Verlag, 201-215. [Google Scholar] [CrossRef]
|
|
[9]
|
Li, B., Hu, Y.P. and Zhong, M.F. (2008) Time-Based Cache attacks on AES. Computer Engineering, 34, 141-143. (In Chinese with English Abstract)
|
|
[10]
|
Bernstein, D.J. (2005) Cache-Timing Attacks on AES. http://cr.yp.to/papers.html\#cachetiming
|
|
[11]
|
Lipp, M., Gruss, D., Spreitzer, R., et al. (2015) ARMageddon: Cache Attacks on Mobile Devices. Mundo Electrónico, 6, 60-65.
|