• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
For: Brumley BB, Tuveri N. Remote Timing Attacks Are Still Practical. Computer Security – ESORICS 2011 2011. [DOI: 10.1007/978-3-642-23822-2_20] [Citation(s) in RCA: 96] [Impact Index Per Article: 7.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
Number Cited by Other Article(s)
1
Chen A, Hong C, Shang X, Jing H, Xu S. Timing leakage to break SM2 signature algorithm. Journal of Information Security and Applications 2022;67:103210. [DOI: 10.1016/j.jisa.2022.103210] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
2
Ma Z, Cai Q, Lin J, Luo B, Jing J. Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers. JCS 2019. [DOI: 10.3233/jcs-191296] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
3
Fuhry B, Bahmani R, Brasser F, Hahn F, Kerschbaum F, Sadeghi AR. HardIDX: Practical and secure index with SGX in a malicious environment. JCS 2018. [DOI: 10.3233/jcs-171103] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
4
Genkin D, Pachmanov L, Pipman I, Tromer E. ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. Topics in Cryptology - CT-RSA 2016 2016. [DOI: 10.1007/978-3-319-29485-8_13] [Citation(s) in RCA: 28] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
5
Bernstein DJ, Lange T, Schwabe P. The Security Impact of a New Cryptographic Library. Progress in Cryptology – LATINCRYPT 2012 2012. [DOI: 10.1007/978-3-642-33481-8_9] [Citation(s) in RCA: 101] [Impact Index Per Article: 8.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/03/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA