J. Agat, Transforming out Timing Leaks, POPL'00, pp.40-53, 2000.

M. R. Albrecht and K. G. Paterson, Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS, EUROCRYPT'16, pp.622-643, 2016.

D. J. Bernstein, Cache-timing attacks on AES, 2005.

A. Bortz and D. Boneh, Exposing Private Information by Timing Web Applications, WWW'07, pp.621-628, 2007.

K. Chatzikokolakis, T. Chothia, and A. Guha, Statistical measurement of information leakage, TACAS'10, pp.390-404, 2010.

T. Chothia, Y. Kawamoto, and C. Novakovic, A Tool for Estimating Information Leakage, CAV'13, pp.690-695, 2013.

T. M. Cover and J. A. Thomas, Elements of Information Theory, vol.2

G. Doychev and B. Köpf, Rational Protection against Timing Attacks, CSF'15, pp.526-536, 2015.

T. Rezk, G. Barthe, and M. Warnier, Preventing Timing Leaks Through Transactional Branching Instructions. ENTCS'06, vol.153, pp.33-55, 2006.

R. Gay, J. Hu, and H. Mantel, CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement, ICISS'14, pp.378-398, 2014.

A. Georges, D. Buytaert, and L. Eeckhout, Statistically Rigorous Java Performance Evaluation, OOPSLA'07, pp.57-76, 2007.

M. S. Inci, B. Gülmezoglu, G. Irazoqui, T. Eisenbarth, and B. Sunar, Cache Attacks Enable Bulk Key Recovery on the Cloud, CHES'16, pp.368-388, 2016.

P. C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO'96, pp.104-113, 1996.

B. Köpf and M. Dürmuth, A Provably Secure and Efficient Countermeasure against Timing Attacks, CSF'09, pp.324-335, 2009.

B. Köpf and H. Mantel, Transformational Typing and Unification for Automatically Correcting Insecure Programs, Int. J. Inf. Sec, vol.6, issue.2-3, pp.107-131, 2007.

B. Köpf and G. Smith, Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, CSF'10, pp.44-56, 2010.

H. Mantel and A. Starostin, Transforming Out Timing Leaks, More or Less, ESORICS'15, pp.447-467, 2015.

D. Molnar, M. Piotrowski, D. Schultz, and D. Wagner, The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks, ICISC'15, vol.3935, pp.156-168, 2005.

A. Shamir, R. L. Rivest, and L. Adleman, A Method for Obtaining Digital Signatures and Public-key Cryptosystems, CACM', vol.78, issue.2, pp.120-126, 1978.

C. E. Shannon, A Mathematical Theory of Communication, ACM SIGMOBILE MC2R'01, vol.5, pp.3-55, 2001.

D. M. Smith and G. Smith, Tight Bounds on Information Leakage from Repeated Independent Runs, CSF'17, pp.318-327, 2017.

D. Zhang, A. Askarov, and A. C. Myers, Predictive Mitigation of Timing Channels in Interactive Systems, CCS'11, pp.563-574, 2011.