-
1
-
-
18844454571
-
Remote timing attacks are practical
-
David Brumley and Dan Boneh. Remote timing attacks are practical. Computer Networks, 48(5):701-716, 2005.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
3
-
-
47949106247
-
Branch target buffer for dynamically predicting branch instruction out-comes using a predicted branch history
-
US Patent 08/509331, Internation Class G06F 9/38, 1996
-
Bradley D. Hoyt, Glenn J. Hinton, Andrew F. Glew, and Subramanian Natarajan. Branch target buffer for dynamically predicting branch instruction out-comes using a predicted branch history. US Patent 08/509331, Internation Class G06F 9/38, 1996.
-
-
-
Hoyt, B.D.1
Hinton, G.J.2
Glew, A.F.3
Natarajan, S.4
-
4
-
-
0022564280
-
Highly concurrent scalar processing
-
Los Alamitos, CA, USA, IEEE Computer Society Press
-
P. Y. T. Hsu and E. S. Davidson. Highly concurrent scalar processing. In ISCA '86: Proceedings of the 13th annual international symposium on Computer architecture, pages 386-395, Los Alamitos, CA, USA, 1986. IEEE Computer Society Press.
-
(1986)
ISCA '86: Proceedings of the 13th annual international symposium on Computer architecture
, pp. 386-395
-
-
Hsu, P.Y.T.1
Davidson, E.S.2
-
5
-
-
84876307879
-
On the power of simple branch prediction analysis
-
Mar
-
Onur Aciiçmez, Çetín Kaya Koç, and Jean-Pierre Seifert. On the power of simple branch prediction analysis. In ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Mar 2007.
-
(2007)
ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007
-
-
Aciiçmez, O.1
Kaya Koç, C.2
Seifert, J.-P.3
-
6
-
-
84944627047
-
Predicting secret keys via branch prediction. In Topics in Cryptology
-
The Cryptographers' Track at the RSA Conference, CT-RSA, of, Springer, Feb
-
Onur Aciiçmez, Jean-Pierre Seifert, and Çetín Kaya Koç. Predicting secret keys via branch prediction. In Topics in Cryptology, The Cryptographers' Track at the RSA Conference, CT-RSA 2007, volume 4377 of LNCS, pages 225-242. Springer, Feb 2007.
-
(2007)
LNCS
, vol.4377
, pp. 225-242
-
-
Aciiçmez, O.1
Seifert, J.-P.2
Kaya Koç, C.3
-
7
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
-
Neal Koblitz, editor, CRYPTO, of, Springer
-
Paul C. Kocher. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In Neal Koblitz, editor, CRYPTO, volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
8
-
-
0029201553
-
A comparison of full and partial predicated execution support for ilp processors
-
New York, NY, USA, ACM Press
-
Scott A. Mahlke, Richard E. Hank, James E. Mc-Cormick, David I. August, and Wen-Mei W. Hwu. A comparison of full and partial predicated execution support for ilp processors. In ISCA '95: Proceedings of the 22nd annual international symposium on Computer architecture, pages 138-150, New York, NY, USA, 1995. ACM Press.
-
(1995)
ISCA '95: Proceedings of the 22nd annual international symposium on Computer architecture
, pp. 138-150
-
-
Mahlke, S.A.1
Hank, R.E.2
Mc-Cormick, J.E.3
August, D.I.4
Hwu, W.-M.W.5
-
9
-
-
33745813464
-
The program counter security model: Automatic detection and removal of control-flow side channel attacks
-
Dongho Won and Seungjoo Kim, editors, ICISC, of, Springer
-
David Molnar, Matt Piotrowski, David Schultz, and David Wagner. The program counter security model: Automatic detection and removal of control-flow side channel attacks. In Dongho Won and Seungjoo Kim, editors, ICISC, volume 3935 of Lecture Notes in Computer Science, pages 156-168. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3935
, pp. 156-168
-
-
Molnar, D.1
Piotrowski, M.2
Schultz, D.3
Wagner, D.4
|