{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:32:10Z","timestamp":1774801930219,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540465591","type":"print"},{"value":"9783540465614","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11894063_16","type":"book-chapter","created":{"date-parts":[[2006,10,16]],"date-time":"2006-10-16T21:49:01Z","timestamp":1161035341000},"page":"201-215","source":"Crossref","is-referenced-by-count":210,"title":["Cache-Collision Timing Attacks Against AES"],"prefix":"10.1007","author":[{"given":"Joseph","family":"Bonneau","sequence":"first","affiliation":[]},{"given":"Ilya","family":"Mironov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/3-540-44448-3_38","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M.-L. Akkar","year":"2000","unstructured":"Akkar, M.-L., B\u00e9van, R., Dischamp, P., Moyart, D.: Power analysis, what is now possible.... In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 489\u2013502. Springer, Heidelberg (2000)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7. K.: Trace driven cache attack on AES. IACR Cryptology ePrint Archive, Report 2006\/138 (April 2006)","DOI":"10.1007\/11935308_9"},{"key":"16_CR3","unstructured":"Ac\u0131i\u00e7mez, O.: Remote Timing Attacks. Given at Intel Corporation, Oregon, USA (December 2005), Available at: \n                    \n                      http:\/\/web.engr.oregonstate.edu\/~aciicmez\/osutass\/"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O., Schindler, W., Ko\u00e7, \u00c7.K.: Improving Brumley and Boneh timing attack on unprotected SSL implementations. In: ACM Conference on Computer and Communications Security (2005)","DOI":"10.1145\/1102120.1102140"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-69710-1_15","volume-title":"Fast Software Encryption","author":"E. Biham","year":"1998","unstructured":"Biham, E., Anderson, R.J., Knudsen, L.R.: Serpent: A new block cipher proposal. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp. 222\u2013238. Springer, Heidelberg (1998)"},{"key":"16_CR6","unstructured":"Brickell, E., Graunke, G., Neve, M., Seifert, J.-P.: Software mitigations to hedge AES against cache-based software side channel vulnerabilities. IACR ePrint Archive, Report 2006\/052 (February 2006)"},{"issue":"5","key":"16_CR7","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/j.comnet.2005.01.010","volume":"48","author":"D. Brumley","year":"2005","unstructured":"Brumley, D., Boneh, D.: Remote timing attacks are practical. Computer Networks\u00a048(5), 701\u2013716 (2005)","journal-title":"Computer Networks"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Breveglieri, L., Monchiero, M., Palermo, G., Zaccaria, V.: AES power attack based on induced cache miss and countermeasure. ITCC(1) (2005)","DOI":"10.1109\/ITCC.2005.62"},{"key":"16_CR9","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES (April 2005), \n                    \n                      http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"16_CR10","unstructured":"Canteaut, A., Lauradoux, C., Seznec, A.: Understanding cache attacks. Technical Report (April 2006), available at: \n                    \n                      ftp:\/\/ftp.inria.fr\/INRIA\/publication\/publi-pdf\/RR\/RR-5881.pdf"},{"key":"16_CR11","unstructured":"Daemen, J., Rijmen, V.: Resistance against implementation attacks: A comparative study of the AES proposals. In: Second AES Candidate Conference (February 1999)"},{"key":"16_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES\u2014the advanced encryption standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES\u2014the advanced encryption standard. Springer, Heidelberg (2002)"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 251\u2013261. Springer, Heidelberg (2001)"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"16_CR16","unstructured":"Koeune, F., Quisquater, J.-J.: A timing attack against Rijndael. Technical Report CG-1999\/1 (June 1999)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. J. of Computer Security\u00a08(2\/3) (2000)","DOI":"10.3233\/JCS-2000-82-304"},{"key":"16_CR18","unstructured":"Laradoux, C.: Collision attacks on processors with cache and countermeasures. In: Wolf, C., Lucks, S., Yau, P.-W. (eds.) Western European Workshop on Research in Cryptology\u2014WEWoRC 2005, pp. 76\u201385 (2005)"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-28632-5_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"H. Ledig","year":"2004","unstructured":"Ledig, H., Muller, F., Valette, F.: Enhancing collision attacks. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 176\u2013190. Springer, Heidelberg (2004)"},{"key":"16_CR20","unstructured":"Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., Roback, E.: Report on the development of the Advanced Encryption Standard (AES) (October 2000), \n                    \n                      http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/round2\/r2report.pdf"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Neve, M., Seifert, J.-P., Wang, Z.: A refined look at Bernstein\u2019s AES side-channel analysis. ASIACCS, 369 (2006)","DOI":"10.1145\/1128817.1128887"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-74462-7_11","volume-title":"Selected Areas in Cryptography","author":"M. Neve","year":"2007","unstructured":"Neve, M., Seifert, J.-P.: Advances on access-driven cache attacks on AES. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol.\u00a04356, pp. 147\u2013162. Springer, Heidelberg (2007)"},{"key":"16_CR23","unstructured":"O\u2019Hanlan, M., Tonge, A.: Investigation of cache timing attacks on AES. School of Computing, Dublin City University (2005)"},{"key":"16_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"D.A. Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"16_CR25","unstructured":"Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel. Technical Report CSTR-02-003, University of Bristol (April 2002)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Page, D.: Defending against cache based side channel attacks. Technical Report. Department of Computer Science, University of Bristol (2003)","DOI":"10.1016\/S1363-4127(03)00104-3"},{"key":"16_CR27","unstructured":"Page, D.: Partitioned cache as a side-channel defense mechanism. IACR Cryptology ePrint Archive, Report 2005\/280 (August 2005)"},{"key":"16_CR28","unstructured":"Percival, C.: Cache missing for fun and profit. In: BSDCan 2005 (2005), \n                    \n                      http:\/\/www.daemonology.net\/hyperthreading-considered-harmful\/"},{"key":"16_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-540-28632-5_12","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"K. Schramm","year":"2004","unstructured":"Schramm, K., Leander, G., Felke, P., Paar, C.: A collision attack on AES: Combining side channel and differential attack. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 163\u2013175. Springer, Heidelberg (2004)"},{"key":"16_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-540-39887-5_16","volume-title":"Fast Software Encryption","author":"K. Schramm","year":"2003","unstructured":"Schramm, K., Wollinger, T.J., Paar, C.: A new class of collision attacks and its application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 206\u2013222. Springer, Heidelberg (2003)"},{"key":"16_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"Y. Tsunoo","year":"2003","unstructured":"Tsunoo, Y., Saito, T., Suzaki, T., Shigeri, M., Miyauchi, H.: Cryptanalysis of DES implemented on computers with cache. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 62\u201376. Springer, Heidelberg (2003)"},{"key":"16_CR32","unstructured":"Tsunoo, Y., Tsujihara, E., Minematsu, K., Miyauchi, H.: Cryptanalysis of block ciphers implemented on computers with cache. In: International Symposium on Information Theory and Applications 2002, pp. 803\u2013806 (2002)"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Tsunoo, Y., Tsujihara, E., Shigeri, M., Kubo, H., Minematsu, K.: Improving cache attacks by considering cipher structure. International Journal of Information Security (2006)","DOI":"10.1007\/s10207-005-0079-7"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11894063_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:00:03Z","timestamp":1558288803000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11894063_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540465591","9783540465614"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/11894063_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}