{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:19:12Z","timestamp":1774264752564,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642385520","type":"print"},{"value":"9783642385537","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38553-7_7","type":"book-chapter","created":{"date-parts":[[2013,5,9]],"date-time":"2013-05-09T00:47:12Z","timestamp":1368060432000},"page":"127-139","source":"Crossref","is-referenced-by-count":14,"title":["Attacking AES Using Bernstein\u2019s Attack on Modern Processors"],"prefix":"10.1007","author":[{"given":"Hassan","family":"Aly","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"ElGayyar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.: Trace-driven cache attacks on AES (short paper). Information and Communications Security, 112\u2013121 (2006)","DOI":"10.1007\/11935308_9"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, K.: Microarchitectural attacks and countermeasures. Cryptographic Engineering, 475\u2013504 (2009)","DOI":"10.1007\/978-0-387-71817-0_18"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/11967668_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"O. Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Schindler, W., Ko\u00e7, \u00c7.K.: Cache based remote timing attack on the AES. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 271\u2013286. Springer, Heidelberg (2006)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O., Schindler, W., Ko\u00e7, \u00c7.: Improving Brumley and Boneh timing attack on unprotected SSL implementations. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 139\u2013146. ACM (2005)","DOI":"10.1145\/1102120.1102140"},{"key":"7_CR5","unstructured":"Bar-El, H.: Introduction to side channel attacks, vol.\u00a043. Discretix Technologies Ltd. (2003)"},{"key":"7_CR6","unstructured":"Bernstein, D.: Cache-timing attacks on AES (2005), http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M., Palermo, G.: AES power attack based on induced cache miss and countermeasure. In: International Conference on Information Technology: Coding and Computing, ITCC 2005, vol.\u00a01, pp. 586\u2013591. IEEE (2005)","DOI":"10.1109\/ITCC.2005.62"},{"key":"7_CR8","unstructured":"Bonneau, J.: Robust final-round cache-trace attacks against AES. Tech. rep., Citeseer (2006)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/11894063_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"J. Bonneau","year":"2006","unstructured":"Bonneau, J., Mironov, I.: Cache-collision timing attacks against AES. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 201\u2013215. Springer, Heidelberg (2006)"},{"key":"7_CR10","unstructured":"Brumley, D., Boneh, D.: Remote timing attacks are practical. In: Proceedings of the 12th Conference on USENIX Security Symposium, vol.\u00a012, p. 1. USENIX Association (2003)"},{"key":"7_CR11","unstructured":"Canteaut, A., Lauradoux, C., Seznec, A.: Understanding cache attacks (2006)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Gallais, J., Kizhvatov, I., Tunstall, M.: Improved trace-driven cache-collision attacks against embedded AES implementations. Information Security Applications, 243\u2013257 (2011)","DOI":"10.1007\/978-3-642-17955-6_18"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Gullasch, D., Bangerter, E., Krenn, S.: Cache games\u2013bringing access-based cache attacks on AES to practice. In: 2011 IEEE Symposium on Security and Privacy (SP), pp. 490\u2013505. IEEE (2011)","DOI":"10.1109\/SP.2011.22"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Jayasinghe, D., Fernando, J., Herath, R., Ragel, R.: Remote cache timing attack on Advanced Encryption Standard and countermeasures. In: 2010 5th International Conference on Information and Automation for Sustainability (ICIAFs), pp. 177\u2013182. IEEE (2010)","DOI":"10.1109\/ICIAFS.2010.5715656"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/BFb0055858","volume-title":"Computer Security \u2013 ESORICS 98","author":"J. Kelsey","year":"1998","unstructured":"Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 97\u2013110. Springer, Heidelberg (1998)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"7_CR17","unstructured":"Lauradoux, C.: Collision attacks on processors with cache and countermeasures. In: Western European Workshop on Research in Cryptology WEWoRC, vol.\u00a05, pp. 76\u201385 (2005)"},{"key":"7_CR18","unstructured":"MIRACL: Multiprecision Integer and Rational Arithmetic C\/C++ Library. Shamus Software Ltd., Dublin, http:\/\/www.shamus.ie"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Mowery, K., Keelveedhi, S., Shacham, H.: Are AES x86 cache timing attacks still feasible? In: Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, pp. 19\u201324. ACM (2012)","DOI":"10.1145\/2381913.2381917"},{"key":"7_CR20","unstructured":"Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., Roback, E.: Report on the development of the Advanced Encryption Standard (AES). Journal of Research of the National Institute of Standards and Technology\u00a0106(3) (2001), http:\/\/archive.org\/details\/jresv106n3p511"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-74462-7_11","volume-title":"Selected Areas in Cryptography","author":"M. Neve","year":"2007","unstructured":"Neve, M., Seifert, J.-P.: Advances on access-driven cache attacks on AES. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol.\u00a04356, pp. 147\u2013162. Springer, Heidelberg (2007)"},{"key":"7_CR22","unstructured":"Neve, M., Seifert, J., Wang, Z.: Cache time-behavior analysis on AES. In: Selected Area of Cryptology (2006)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Neve, M., Seifert, J., Wang, Z.: A refined look at Bernstein\u2019s AES side-channel analysis. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications security. pp. 369\u2013369. ACM (2006)","DOI":"10.1145\/1128817.1128887"},{"key":"7_CR24","unstructured":"O\u2019Hanlon, M., Tonge, A.: Investigation of cache timing attacks on AES. School of Computing, Dublin City University (2005)"},{"key":"7_CR25","unstructured":"OpenSSL: The open source toolkit for SSL\/TLS, http:\/\/www.openssl.org"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"D.A. Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: The case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"7_CR27","unstructured":"Page, D.: Theoretical use of cache memory as a cryptanalytic side-channel. Tech. rep., Citeseer (2002)"},{"issue":"1","key":"7_CR28","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/S1363-4127(03)00104-3","volume":"8","author":"D. Page","year":"2003","unstructured":"Page, D.: Defending against cache-based side-channel attacks. Information Security Technical Report\u00a08(1), 30\u201344 (2003)","journal-title":"Information Security Technical Report"},{"key":"7_CR29","unstructured":"Percival, C.: Cache missing for fun and profit. In: BSDCan 2005 (2005)"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Rebeiro, C., Mondal, M., Mukhopadhyay, D.: Pinpointing cache timing attacks on AES. In: 23rd International Conference on VLSI Design, VLSID 2010, pp. 306\u2013311. IEEE (2010)","DOI":"10.1109\/VLSI.Design.2010.29"},{"key":"7_CR31","unstructured":"Rijmen, V., Bosselaers, A., Barreto, P.: Optimised ANSI C code for the Rijndael cipher (now AES). Public domain software (2000), http:\/\/fastcrypto.org\/front\/misc\/rijndael-alg-fst.c"},{"key":"7_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-74619-5_25","volume-title":"Fast Software Encryption","author":"K. Tiri","year":"2007","unstructured":"Tiri, K., Ac\u0131i\u00e7mez, O., Neve, M., Andersen, F.: An analytical model for time-driven cache attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 399\u2013413. Springer, Heidelberg (2007)"},{"issue":"1","key":"7_CR33","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s00145-009-9049-y","volume":"23","author":"E. Tromer","year":"2009","unstructured":"Tromer, E., Osvik, D., Shamir, A.: Efficient cache attacks on AES, and countermeasures. Journal of Cryptology\u00a023(1), 37\u201371 (2009)","journal-title":"Journal of Cryptology"},{"key":"7_CR34","unstructured":"Tsunoo, Y.: Cryptanalysis of block ciphers implemented on computers with cache. In: Preproceedings of ISITA 2002 (2002)"},{"key":"7_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"Y. Tsunoo","year":"2003","unstructured":"Tsunoo, Y., Saito, T., Suzaki, T., Shigeri, M., Miyauchi, H.: Cryptanalysis of DES implemented on computers with cache. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 62\u201376. Springer, Heidelberg (2003)"},{"key":"7_CR36","unstructured":"Zhao, X., Wang, T.: Improved cache trace attack on AES and CLEFIA by considering cache miss and S-box misalignment. Tech. rep., Cryptology ePrint Archive, Report 2010\/056 (2010)"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Zhao, X., Wang, T., Dong, M., Yuanyuan, Z., Zhaoyang, L.: Robust first two rounds access driven cache timing attack on AES. In: 2008 International Conference on Computer Science and Software Engineering, vol.\u00a03, pp. 785\u2013788. IEEE (2008)","DOI":"10.1109\/CSSE.2008.633"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38553-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T09:17:53Z","timestamp":1746004673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38553-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385520","9783642385537"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38553-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}