-
2
-
-
84954462346
-
A practical implementation of the timing attack
-
J.-F. Dhem, F. Koeune, P.-A. Leroux, P. Mestré, J.-J. Quisquater, and J.-L. Willems, "A practical implementation of the timing attack," in CARDIS, 1998, pp. 167-182.
-
(1998)
CARDIS
, pp. 167-182
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestré, P.4
Quisquater, J.-J.5
Willems, J.-L.6
-
3
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Advances in Cryptology - CRYPTO 99, LNCS 1666. Springer-Verlag, 1999, pp. 388-397.
-
(1999)
Advances in Cryptology - CRYPTO 99, LNCS 1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
5
-
-
33745640963
-
Cache attacks and countermeasures: The case of AES
-
Springer-Verlag
-
D. A. Osvik, A. Shamir, and E. Tromer, "Cache attacks and countermeasures: the case of AES," in Topics in Cryptology - CT-RSA 2006, The Cryptographers Track at the RSA Conference 2006. Springer-Verlag, 2006, pp. 1-20.
-
(2006)
Topics in Cryptology - CT-RSA 2006, The Cryptographers Track at the RSA Conference 2006
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
6
-
-
34547331261
-
Covert and side channels due to processor architecture
-
Washington, DC, USA: IEEE Computer Society
-
Z. Wang and R. B. Lee, "Covert and side channels due to processor architecture," in ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society, 2006, pp. 473-482.
-
(2006)
ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference
, pp. 473-482
-
-
Wang, Z.1
Lee, R.B.2
-
7
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
-, "New cache designs for thwarting software cache-based side channel attacks," SIGARCH Comput. Archit. News, vol.35, no.2, pp. 494-505, 2007.
-
(2007)
SIGARCH Comput. Archit. News
, vol.35
, Issue.2
, pp. 494-505
-
-
-
9
-
-
38549138136
-
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
-
report 2006/052
-
E. Brickell, G. Graunke, M. Neve, and J. pierre Seifert, "Software mitigations to hedge AES against cache-based software side channel vulnerabilities. iacr eprint archive, report 2006/052," 2006.
-
(2006)
Iacr Eprint Archive
-
-
Brickell, E.1
Graunke, G.2
Neve, M.3
Seifert, J.P.4
-
12
-
-
47949084990
-
Countermeasures against branch target buffer attacks
-
Washington, DC, USA: IEEE Computer Society
-
G. Agosta, L. Breveglieri, G. Pelosi, and I. Koren, "Countermeasures against branch target buffer attacks," in FDTC '07: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography. Washington, DC, USA: IEEE Computer Society, 2007, pp. 75-79.
-
(2007)
FDTC '07: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography
, pp. 75-79
-
-
Agosta, G.1
Breveglieri, L.2
Pelosi, G.3
Koren, I.4
-
13
-
-
33745813464
-
-
D. Molnar, M. Piotrowski, D. Schultz, and D. Wagner, "The program counter security model: Automatic detection and removal of control-flow side channel attacks," pp. 156-168, 2005.
-
(2005)
The Program Counter Security Model: Automatic Detection and Removal of Control-flow side Channel Attacks
, pp. 156-168
-
-
Molnar, D.1
Piotrowski, M.2
Schultz, D.3
Wagner, D.4
-
14
-
-
70449675390
-
The program counter security model: Automatic detection and removal of control-flow side channel attacks
-
-, "The program counter security model: Automatic detection and removal of control-flow side channel attacks," in In Cryptology ePrint Archive, Report 2005/368, 2005.
-
(2005)
Cryptology ePrint Archive, Report 2005/368
-
-
-
16
-
-
70449663138
-
Improvements in the intel core 2 processor family architecture and microarchitecture
-
J. Coke, H. Balig, N. Cooray, E. Gamsaragan, P. Smith, K. Yoon, J. Abel, and A. Valles, "Improvements in the Intel Core 2 processor family architecture and microarchitecture," Intel Technology Journal, vol.12, no.03, pp. 179-192, 2008.
-
(2008)
Intel Technology Journal
, vol.12
, Issue.3
, pp. 179-192
-
-
Coke, J.1
Balig, H.2
Cooray, N.3
Gamsaragan, E.4
Smith, P.5
Yoon, K.6
Abel, J.7
Valles, A.8
-
20
-
-
34547440900
-
Selective predicate prediction for out-of-order processors
-
E. Quiñones, J.-M. Parcerisa, and A. Gonzalez, "Selective predicate prediction for out-of-order processors," in ICS '06: Proceedings of the 20th annual international conference on Supercomputing, 2006, pp. 46-54.
-
(2006)
ICS '06: Proceedings of the 20th Annual International Conference on Supercomputing
, pp. 46-54
-
-
Quiñones, E.1
Parcerisa, J.-M.2
Gonzalez, A.3
-
21
-
-
64949133467
-
Advanced encryption standard (AES) instructions set
-
S. Gueron, "Advanced encryption standard (AES) instructions set," Intel Mobility Group, Tech. Rep., 2008.
-
(2008)
Intel Mobility Group, Tech. Rep.
-
-
Gueron, S.1
-
22
-
-
0020915645
-
Conversion of control dependence to data dependence
-
J. R. Allen, K. Kennedy, C. Porterfield, and J. Warren, "Conversion of control dependence to data dependence," in POPL '83: Proceedings of the 10th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, 1983.
-
(1983)
POPL '83: Proceedings of the 10th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages
-
-
Allen, J.R.1
Kennedy, K.2
Porterfield, C.3
Warren, J.4
-
23
-
-
0032672878
-
The program decision logic approach to predicated execution
-
Washington, DC, USA: IEEE Computer Society
-
D. I. August, J. W. Sias, J.-M. Puiatti, S. A. Mahlke, D. A. Connors, K. M. Crozier, and W. mei W. Hwu, "The program decision logic approach to predicated execution," in ISCA '99: Proceedings of the 26th annual international symposium on Computer architecture. Washington, DC, USA: IEEE Computer Society, 1999, pp. 208-219.
-
(1999)
ISCA '99: Proceedings of the 26th Annual International Symposium on Computer architecture
, pp. 208-219
-
-
August, D.I.1
Sias, J.W.2
Puiatti, J.-M.3
Mahlke, S.A.4
Connors, D.A.5
Crozier, K.M.6
Hwu, W.M.W.7
-
24
-
-
0032690109
-
Control cpr: A branch height reduction optimization for epic architectures
-
New York, NY, USA: ACM
-
M. Schlansker, S. Mahlke, and R. Johnson, "Control cpr: a branch height reduction optimization for epic architectures," in PLDI '99: Proceedings of the ACM SIGPLAN 1999 conference on Programming language design and implementation. New York, NY, USA: ACM, 1999, pp. 155-168.
-
(1999)
PLDI '99: Proceedings of the ACM SIGPLAN 1999 Conference on Programming Language Design and Implementation
, pp. 155-168
-
-
Schlansker, M.1
Mahlke, S.2
Johnson, R.3
-
25
-
-
14344276582
-
Performance evaluation of AES finalists on the high-end smart card
-
F. Sano, M. Koike, S. Kawamura, and M. Shiba, "Performance evaluation of AES finalists on the high-end smart card," in AES Candidate Conference, 2000, pp. 82-93.
-
(2000)
AES Candidate Conference
, pp. 82-93
-
-
Sano, F.1
Koike, M.2
Kawamura, S.3
Shiba, M.4
-
28
-
-
70449649144
-
Fault based cryptanalysis of the advanced encryption standard (AES)
-
J. Blömer and J.-P. Seifert, "Fault based cryptanalysis of the advanced encryption standard (AES)," in FSE, 2003.
-
(2003)
FSE
-
-
Blömer, J.1
Seifert, J.-P.2
-
30
-
-
70449661397
-
Using exception handling to build opaque predicates in intermediate code obfuscation techniques
-
D. Dolz and G. Parra, "Using exception handling to build opaque predicates in intermediate code obfuscation techniques," Journal of Computer Science & Technology, vol.8, no.2, 2008.
-
(2008)
Journal of Computer Science & Technology
, vol.8
, Issue.2
-
-
Dolz, D.1
Parra, G.2
-
31
-
-
36949003942
-
LLVM: A compilation framework for lifelong program analysis & transformation
-
Computer Science Dept. Univ. of Illinois at Urbana-Champaign, Sep
-
C. Lattner and V. Adve, "LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation," Computer Science Dept., Univ. of Illinois at Urbana-Champaign, Tech. Report UIUCDCS-R-2003-2380, Sep 2003.
-
(2003)
Tech. Report UIUCDCS-R-2003-2380
-
-
Lattner, C.1
Adve, V.2
|