Trace-Driven Cache Attacks on AES ,
Attacking AES Using Bernstein???s Attack on Modern Processors, LNCS, vol.7918, pp.127-139, 2013. ,
DOI : 10.1007/978-3-642-38553-7_7
ARM Technical Reference Manual, Cortex-A8, Revision: r3p2, 2010. ,
Cache-timing attacks on AES, 2005. ,
Template Attacks, CHES, volume 2523 of LNCS, pp.13-28, 2002. ,
DOI : 10.1007/3-540-36400-5_3
Error-Tolerance in Trace-Driven Cache Collision Attacks, In COSADE, pp.222-232, 2011. ,
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations, LNCS, vol.6513, pp.243-257, 2010. ,
DOI : 10.1007/978-3-642-17955-6_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6567
Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version, Journal of Cryptographic Engineering, vol.8, issue.2, pp.45-58, 2013. ,
DOI : 10.1007/s13389-013-0051-9
Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice, 2011 IEEE Symposium on Security and Privacy, pp.490-505, 2011. ,
DOI : 10.1109/SP.2011.22
Side Channel Cryptanalysis of Product Ciphers, ESORICS, volume 1485 of LNCS, pp.97-110, 1998. ,
Analysis of Pseudo Random Sequences Generated by Cellular Automata, LNCS, vol.547, pp.186-199, 1991. ,
DOI : 10.1007/3-540-46416-6_17
Cache-based Vulnerabilities and SPAM Analysis, 2006. ,
Advances on Access-Driven Cache Attacks on AES, Selected Areas in Cryptography, pp.147-162, 2006. ,
DOI : 10.1007/978-3-540-74462-7_11
A refined look at Bernstein's AES side-channel analysis, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, p.369, 2006. ,
DOI : 10.1145/1128817.1128887
Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel, IACR Cryptology ePrint Archive, p.169, 2002. ,
Remote cache-timing attacks against AES, Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 '14, pp.45-48, 2014. ,
DOI : 10.1145/2556315.2556322
On the Applicability of Time-Driven Cache Attacks on Mobile Devices, Network and System Security, pp.656-662, 2013. ,
DOI : 10.1007/978-3-642-38631-2_53
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version), IACR Cryptology ePrint Archive, p.172, 2013. ,
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient, LNCS, vol.7959, pp.286-301, 2013. ,
DOI : 10.1007/978-3-642-39059-3_20
Efficient Cache Attacks on AES, and Countermeasures, Journal of Cryptology, vol.10, issue.4, pp.37-71, 2010. ,
DOI : 10.1007/s00145-009-9049-y
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.1984
Cryptanalysis of DES Implemented on Computers with Cache, CHES, volume 2779 of LNCS, pp.62-76, 2003. ,
DOI : 10.1007/978-3-540-45238-6_6
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography, pp.390-406, 2012. ,
DOI : 10.1007/978-3-642-35999-6_25
Security Evaluations beyond Computing Power, LNCS, vol.7881, pp.126-141, 2013. ,
DOI : 10.1007/978-3-642-38348-9_8
URL : http://hdl.handle.net/2078.1/133720
A Cache Timing Attack on AES in Virtualization Environments, Financial Cryptography, pp.314-328, 2012. ,