{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:08:51Z","timestamp":1775837331947,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540310334","type":"print"},{"value":"9783540326489","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11605805_1","type":"book-chapter","created":{"date-parts":[[2005,12,22]],"date-time":"2005-12-22T11:08:03Z","timestamp":1135249683000},"page":"1-20","source":"Crossref","is-referenced-by-count":716,"title":["Cache Attacks and Countermeasures: The Case of AES"],"prefix":"10.1007","author":[{"given":"Dag Arne","family":"Osvik","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]},{"given":"Eran","family":"Tromer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Anderson, R.J., Biham, E., Knudsen, L.R.: Serpent: A proposal for the Advanced Encryption Standard. AES submission (1998), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/~rja14\/serpent.html"},{"key":"1_CR2","unstructured":"Bernstein, D.: Cache-timing attacks on AES (2005) (preprint), \n                    \n                      http:\/\/cr.yp.to\/papers.html#cachetiming"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption","author":"E. Biham","year":"1997","unstructured":"Biham, E.: A fast new DES implementation in software. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 260\u2013272. Springer, Heidelberg (1997)"},{"key":"1_CR4","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael, version 2, AES submission (1999), \n                    \n                      http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/rijndael\/Rijndael-ammended.pdf"},{"issue":"3","key":"1_CR5","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the ACM\u00a043(3), 431\u2013473 (1996)","journal-title":"Journal of the ACM"},{"key":"1_CR6","unstructured":"Koeune, F., Quisquater, J.: A timing attack against Rijndael, technical report CG-1999\/1, Universit\u00e9 catholique de Louvain, \n                    \n                      http:\/\/www.dice.ucl.ac.be\/crypto\/tech_reports\/CG1999_1.ps.gz"},{"key":"1_CR7","first-page":"52","volume-title":"IEEE Symposium on Security and Privacy","author":"W.-M. Hu","year":"1992","unstructured":"Hu, W.-M.: Lattice scheduling and covert channels. In: IEEE Symposium on Security and Privacy, pp. 52\u201361. IEEE, Los Alamitos (1992)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/BFb0055858","volume-title":"Computer Security \u2013 ESORICS 98","author":"J. Kelsey","year":"1998","unstructured":"Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 97\u2013110. Springer, Heidelberg (1998)"},{"key":"1_CR9","unstructured":"Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel, technical report CSTR-02-003, Department of Computer Science, University of Bristol (2002), \n                    \n                      http:\/\/www.cs.bris.ac.uk\/Publications\/pub_info.jsp?id=1000625"},{"key":"1_CR10","unstructured":"Meushaw, R.V., Schneider, M.S., Simard, D.N., Wagner, G.M.: Device for and method of secure computing using virtual machines, US patent 6,922,774 (2005)"},{"key":"1_CR11","unstructured":"National Institute of Standards and Technology, Advanced Encryption Standard (AES), FIPS PUB 197 (2001)"},{"key":"1_CR12","unstructured":"National Institute of Standards and Technology, Secure Hash Standard (SHS), FIPS PUB 180-2 (2002)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A side-channel analysis resistant description of the AES S-box. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 413\u2013423. Springer, Heidelberg (2005) (to appear)","DOI":"10.1007\/11502760_28"},{"key":"1_CR14","unstructured":"Percival, C.: Cache missing for fun and profit, BSDCan 2005, Ottawa (2005); see, \n                    \n                      http:\/\/www.daemonology.net\/hyperthreading-considered-harmful\/"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"Y. Tsunoo","year":"2003","unstructured":"Tsunoo, Y., Saito, T., Suzaki, T., Shigeri, M., Miyauchi, H.: Cryptanalysis of DES implemented on computers with cache. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 62\u201376. Springer, Heidelberg (2003)"},{"key":"1_CR16","first-page":"292","volume-title":"Proc. Intl. Conference on Compilers, Architectures and Synthesis for Embedded Systems","author":"X. Zhuang","year":"2004","unstructured":"Zhuang, X., Zhang, T., Lee, H.S., Pande, S.: Hardware assisted control flow obfuscation for embedded processors. In: Proc. Intl. Conference on Compilers, Architectures and Synthesis for Embedded Systems, pp. 292\u2013302. ACM, New York (2004)"},{"key":"1_CR17","first-page":"82","volume-title":"Proc. Architectural Support for Programming Languages and Operating Systems","author":"X. Zhuang","year":"2004","unstructured":"Zhuang, X., Zhang, T., Pande, S.: HIDE: An Infrastructure for Efficiently protecting information leakage on the address bus. In: Proc. Architectural Support for Programming Languages and Operating Systems, pp. 82\u201384. ACM, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11605805_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:05:35Z","timestamp":1619507135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11605805_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540310334","9783540326489"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11605805_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}