O. Aciiçmez and C. Koç, Trace-Driven Cache Attacks on AES

H. Aly and M. Elgayyar, Attacking AES Using Bernstein???s Attack on Modern Processors, LNCS, vol.7918, pp.127-139, 2013.
DOI : 10.1007/978-3-642-38553-7_7

A. Ltd, ARM Technical Reference Manual, Cortex-A8, Revision: r3p2, 2010.

D. J. Bernstein, Cache-timing attacks on AES, 2005.

S. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, CHES, volume 2523 of LNCS, pp.13-28, 2002.
DOI : 10.1007/3-540-36400-5_3

J. Gallais and I. Kizhvatov, Error-Tolerance in Trace-Driven Cache Collision Attacks, In COSADE, pp.222-232, 2011.

J. Gallais, I. Kizhvatov, and M. Tunstall, Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations, LNCS, vol.6513, pp.243-257, 2010.
DOI : 10.1007/978-3-642-17955-6_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6567

B. Gérard and F. Standaert, Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version, Journal of Cryptographic Engineering, vol.8, issue.2, pp.45-58, 2013.
DOI : 10.1007/s13389-013-0051-9

D. Gullasch, E. Bangerter, and S. Krenn, Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice, 2011 IEEE Symposium on Security and Privacy, pp.490-505, 2011.
DOI : 10.1109/SP.2011.22

J. Kelsey, B. Schneier, D. Wagner, and C. Hall, Side Channel Cryptanalysis of Product Ciphers, ESORICS, volume 1485 of LNCS, pp.97-110, 1998.

W. Meier and O. Staffelbach, Analysis of Pseudo Random Sequences Generated by Cellular Automata, LNCS, vol.547, pp.186-199, 1991.
DOI : 10.1007/3-540-46416-6_17

M. Neve, Cache-based Vulnerabilities and SPAM Analysis, 2006.

M. Neve and J. Seifert, Advances on Access-Driven Cache Attacks on AES, Selected Areas in Cryptography, pp.147-162, 2006.
DOI : 10.1007/978-3-540-74462-7_11

M. Neve, J. Seifert, and Z. Wang, A refined look at Bernstein's AES side-channel analysis, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, p.369, 2006.
DOI : 10.1145/1128817.1128887

D. Page, Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel, IACR Cryptology ePrint Archive, p.169, 2002.

V. Saraswat, D. Feldman, D. F. Kune, and S. Das, Remote cache-timing attacks against AES, Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 '14, pp.45-48, 2014.
DOI : 10.1145/2556315.2556322

R. Spreitzer and T. Plos, On the Applicability of Time-Driven Cache Attacks on Mobile Devices, Network and System Security, pp.656-662, 2013.
DOI : 10.1007/978-3-642-38631-2_53

R. Spreitzer and T. Plos, On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version), IACR Cryptology ePrint Archive, p.172, 2013.

J. Takahashi, T. Fukunaga, K. Aoki, and H. Fuji, Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient, LNCS, vol.7959, pp.286-301, 2013.
DOI : 10.1007/978-3-642-39059-3_20

E. Tromer, D. A. Osvik, and A. Shamir, Efficient Cache Attacks on AES, and Countermeasures, Journal of Cryptology, vol.10, issue.4, pp.37-71, 2010.
DOI : 10.1007/s00145-009-9049-y

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.1984

Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, and H. Miyauchi, Cryptanalysis of DES Implemented on Computers with Cache, CHES, volume 2779 of LNCS, pp.62-76, 2003.
DOI : 10.1007/978-3-540-45238-6_6

N. Veyrat-charvillon, B. Gérard, M. Renauld, and F. Standaert, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography, pp.390-406, 2012.
DOI : 10.1007/978-3-642-35999-6_25

N. Veyrat-charvillon, B. Gérard, and F. Standaert, Security Evaluations beyond Computing Power, LNCS, vol.7881, pp.126-141, 2013.
DOI : 10.1007/978-3-642-38348-9_8

URL : http://hdl.handle.net/2078.1/133720

M. Weiß, B. Heinz, and F. Stumpf, A Cache Timing Attack on AES in Virtualization Environments, Financial Cryptography, pp.314-328, 2012.