{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:13:54Z","timestamp":1775873634701,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,7,23]],"date-time":"2009-07-23T00:00:00Z","timestamp":1248307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1007\/s00145-009-9049-y","type":"journal-article","created":{"date-parts":[[2009,7,22]],"date-time":"2009-07-22T14:29:45Z","timestamp":1248272985000},"page":"37-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":307,"title":["Efficient Cache Attacks on AES, and Countermeasures"],"prefix":"10.1007","volume":"23","author":[{"given":"Eran","family":"Tromer","sequence":"first","affiliation":[]},{"given":"Dag Arne","family":"Osvik","sequence":"additional","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,23]]},"reference":[{"issue":"2","key":"9049_CR1","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/1064340.1064341","volume":"5","author":"M. Abadi","year":"2005","unstructured":"M. Abadi, M. Burrows, M. Manasse, T. Wobber, Moderately hard, memory-bound functions. ACM Trans. Internet Technol.\n                           5(2), 299\u2013327 (2005)","journal-title":"ACM Trans. Internet Technol."},{"key":"9049_CR2","unstructured":"O. Ac\u0131i\u00e7mez, Yet another microarchitectural attack: exploiting I-cache, in IACR Cryptology ePrint Archive, report 2007\/164 (2007). \n                    http:\/\/eprint.iacr.org\/2007\/164"},{"key":"9049_CR3","unstructured":"O. Ac\u0131i\u00e7mez, \u00c7.K. Ko\u00e7, Trace driven cache attack on AES. IACR Cryptology ePrint Archive, report 2006\/138 (2006). \n                    http:\/\/eprint.iacr.org\/2006\/138\n                    \n                  ; full version of [4]"},{"key":"9049_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/11935308_9","volume-title":"Proc. International Conference on Information and Communications Security (ICICS) 2006","author":"O. Ac\u0131i\u00e7mez","year":"2006","unstructured":"O. Ac\u0131i\u00e7mez, \u00c7.K. Ko\u00e7, Trace driven cache attack on AES (short paper), in Proc. International Conference on Information and Communications Security (ICICS) 2006. Lecture Notes in Computer Science, vol. 4296 (Springer, Berlin, 2006), pp. 112\u2013121. Short version of [3]"},{"key":"9049_CR5","unstructured":"O. Ac\u0131i\u00e7mez, \u00c7.K. Ko\u00e7, J.-P. Seifert, On the power of simple branch prediction analysis. IACR Cryptology ePrint Archive, report 2006\/351 (2006)"},{"key":"9049_CR6","series-title":"Lecture Notes in Computer Science","first-page":"225","volume-title":"Proc. RSA Conference Cryptographers Track (CT-RSA) 2007","author":"O. Ac\u0131i\u00e7mez","year":"2007","unstructured":"O. Ac\u0131i\u00e7mez, \u00c7.K. Ko\u00e7, J.-P. Seifert, Predicting secret keys via branch prediction, in Proc. RSA Conference Cryptographers Track (CT-RSA) 2007. Lecture Notes in Computer Science, vol. 4377 (Springer, Berlin, 2007), pp. 225\u2013242"},{"key":"9049_CR7","series-title":"Lecture Notes in Computer Science","first-page":"271","volume-title":"Proc. RSA Conference Cryptographers Track (CT-RSA) 2007","author":"O. Ac\u0131i\u00e7mez","year":"2007","unstructured":"O. Ac\u0131i\u00e7mez, W. Schindler, \u00c7.K. Ko\u00e7, Cache based remote timing attack on the AES, in Proc. RSA Conference Cryptographers Track (CT-RSA) 2007. Lecture Notes in Computer Science, vol. 4377 (Springer, Berlin, 2007), pp. 271\u2013286"},{"key":"9049_CR8","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/FDTC.2007.16","volume-title":"Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) 2007","author":"O. Ac\u0131i\u00e7mez","year":"2007","unstructured":"O. Ac\u0131i\u00e7mez, J.-P. Seifert, Cheap hardware parallelism implies cheap security, in Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) 2007 (IEEE, New York, 2007), pp. 80\u201391"},{"key":"9049_CR9","unstructured":"R.J. Anderson, E. Biham, L.R. Knudsen, Serpent: A\u00a0Proposal for the Advanced Encryption Standard. AES submission (1998). \n                    http:\/\/www.cl.cam.ac.uk\/~rja14\/serpent.html"},{"key":"9049_CR10","unstructured":"D.J. Bernstein, Cache-timing attacks on AES. Preprint (2005). \n                    http:\/\/cr.yp.to\/papers.html#cachetiming"},{"key":"9049_CR11","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/ITCC.2005.62","volume-title":"Proc. International Conference on Information Technology: Coding and Computing (ITCC\u201905)","author":"G. Bertoni","year":"2005","unstructured":"G. Bertoni, V. Zaccaria, L. Breveglieri, M. Monchiero, G. Palermo, AES power attack based on induced cache miss and countermeasure, in Proc. International Conference on Information Technology: Coding and Computing (ITCC\u201905) (IEEE, New York, 2005), pp. 586\u2013591"},{"key":"9049_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Proc. Fast Software Encryption (FSE) 1997","author":"E. Biham","year":"1997","unstructured":"E. Biham, A fast new DES implementation in software, in Proc. Fast Software Encryption (FSE) 1997. Lecture Notes in Computer Science, vol. 1267 (Springer, Berlin, 1997), pp. 260\u2013272"},{"issue":"1","key":"9049_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham, A. Shamir, Differential cryptanalysis of DES-like Cryptosystems. J.\u00a0Cryptol.\n                           4(1), 3\u201372 (1991)","journal-title":"J.\u00a0Cryptol."},{"key":"9049_CR14","first-page":"90","volume-title":"Proc. Conference on Foundations of Computer Science (FOCS) 1991","author":"M. Blum","year":"1991","unstructured":"M. Blum, W. Evans, P. Gemmell, S. Kannan, M. Naor, Checking the correctness of memories, in Proc. Conference on Foundations of Computer Science (FOCS) 1991 (IEEE, New York, 1991), pp. 90\u201399"},{"key":"9049_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/11894063_16","volume-title":"Proc. Cryptographic Hardware and Embedded Systems (CHES) 2006","author":"J. Bonneau","year":"2006","unstructured":"J. Bonneau, I. Mironov, Cache-collision timing attacks against AES, in Proc. Cryptographic Hardware and Embedded Systems (CHES) 2006. Lecture Notes in Computer Science, vol. 4249 (Springer, Berlin, 2006), pp. 201\u2013215"},{"key":"9049_CR16","unstructured":"E. Brickell, G. Graunke, M. Neve, J.-P. Seifert, Software mitigations to hedge AES against cache-based software side channel vulnerabilities. IACR Cryptology ePrint Archive, report 2006\/052 (2006). \n                    http:\/\/eprint.iacr.org\/2006\/052"},{"key":"9049_CR17","unstructured":"E. Brickell, G. Graunke, J.-P. Seifert, Mitigating cache\/timing attacks in AES and RSA software implementations, in RSA Conference 2006, San Jose, session DEV-203 (2006). \n                    http:\/\/2006.rsaconference.com\/us\/cd_pdfs\/DEV-203.pdf"},{"key":"9049_CR18","unstructured":"A. Canteaut, C. Lauradoux, A. Seznec, Understanding cache attacks. Research report RR-5881, INRIA, April 2006. \n                    http:\/\/www-rocq.inria.fr\/codes\/Anne.Canteaut\/Publications\/RR-5881.pdf"},{"key":"9049_CR19","unstructured":"J. Daemen, V. Rijmen, AES Proposal: Rijndael, version 2, AES submission (1999). \n                    http:\/\/csrc.nist.gov\/archive\/aes\/rijndael\/Rijndael-ammended.pdf"},{"key":"9049_CR20","isbn-type":"print","volume-title":"The Design of Rijndael: AES\u2014The Advanced Encryption Standard","author":"J. Daemen","year":"2001","unstructured":"J. Daemen, V. Rijmen, The Design of Rijndael: AES\u2014The Advanced Encryption Standard (Springer, Berlin, 2001). ISBN 3-540-42580-2","ISBN":"https:\/\/id.crossref.org\/isbn\/3540425802"},{"key":"9049_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/978-3-540-45146-4_25","volume-title":"Proc. CRYPTO\u20192003","author":"C. Dwork","year":"2003","unstructured":"C. Dwork, A. Goldberg, M. Naor, On memory-bound functions for fighting spam, in Proc. CRYPTO\u20192003. Lecture Notes in Computer Science, vol. 2729 (Springer, Berlin, 2003), pp. 426\u2013444"},{"issue":"3","key":"9049_CR22","first-page":"431","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"O. Goldreich, R. Ostrovsky, Software protection and simulation on oblivious RAMs. J.\u00a0ACM\n                           43(3), 431\u2013473 (1996)","journal-title":"J.\u00a0ACM"},{"key":"9049_CR23","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/RISP.1991.130768","volume-title":"Proc. IEEE Computer Society Symposium on Research in Security and Privacy","author":"W.-M. Hu","year":"1991","unstructured":"W.-M. Hu, Reducing timing channels with fuzzy time, in Proc. IEEE Computer Society Symposium on Research in Security and Privacy (IEEE, New York, 1991), pp. 8\u201320"},{"key":"9049_CR24","first-page":"52","volume-title":"IEEE Symposium on Security and Privacy","author":"W.-M. Hu","year":"1992","unstructured":"W.-M. Hu, Lattice scheduling and covert channels, in IEEE Symposium on Security and Privacy (IEEE, New York, 1992), pp. 52\u201361"},{"key":"9049_CR25","unstructured":"Intel Corp., Intel IXP42X Product Line of Network Processors and IXC1100 Control Plane Processor Developer\u2019s Manual. Order Number 252480-006US (2006). \n                    http:\/\/www.intel.com\/design\/network\/manuals\/252480.htm"},{"key":"9049_CR26","unstructured":"E. K\u00e4sper, P. Schwabe, Faster and Timing-Attack Resistant AES-GCM. IACR Cryptology ePrint Archive, report 2009\/129 (2009). \n                    http:\/\/eprint.iacr.org\/2009\/129"},{"key":"9049_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/BFb0055858","volume-title":"Proc. 5th European Symposium on Research in Computer Security","author":"J. Kelsey","year":"1998","unstructured":"J. Kelsey, B. Schneier, D. Wagner, C. Hall, Side channel cryptanalysis of product ciphers, in Proc. 5th European Symposium on Research in Computer Security. Lecture Notes in Computer Science, vol. 1485 (Springer, Berlin, 1998), pp. 97\u2013110"},{"key":"9049_CR28","unstructured":"S. Kent et al., RFC 4301 through RFC 4309. Network Working Group Request for Comments. \n                    http:\/\/rfc.net\/rfc4301.html\n                    \n                   etc. (2005)"},{"issue":"4","key":"9049_CR29","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1145\/138873.138876","volume":"10","author":"R.E. Kessler","year":"1992","unstructured":"R.E. Kessler, M.D. Hill, Page placement algorithms for large real-indexed caches. ACM Trans. Comput. Syst.\n                           10(4), 338\u2013359 (1992)","journal-title":"ACM Trans. Comput. Syst."},{"key":"9049_CR30","unstructured":"F. Koeune, J.-J. Quisquater, A timing attack against Rijndael. Technical Report CG-1999\/1, Universit\u00e9 catholique de Louvain, \n                    http:\/\/www.dice.ucl.ac.be\/crypto\/tech_reports\/CG1999_1.ps.gz"},{"key":"9049_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/978-3-540-79263-5_12","volume-title":"Proc. RSA Conference Cryptographers Track (CT-RSA) 2008","author":"R. K\u00f6nighofer","year":"2008","unstructured":"R. K\u00f6nighofer, A fast and cache-timing resistant implementation of the AES, in Proc. RSA Conference Cryptographers Track (CT-RSA) 2008. Lecture Notes in Computer Science, vol. 4964 (Springer, Berlin, 2008), pp. 187\u2013202"},{"key":"9049_CR32","unstructured":"C. Lauradoux, Collision attacks on processors with cache and countermeasures, in Western European Workshop on Research in Cryptology (WEWoRC) 2005. Lectures Notes in Informatics, vol.\u00a0P-74 (2005), pp.\u00a076\u201385. \n                    http:\/\/www.cosic.esat.kuleuven.ac.be\/WeWorc\/allAbstracts.pdf"},{"key":"9049_CR33","volume-title":"The Java Virtual Machine Specification","author":"T. Lindholm","year":"1999","unstructured":"T. Lindholm, F. Yellin, The Java Virtual Machine Specification, 2nd edn. (Prentice Hall, New York, 1999)","edition":"2"},{"key":"9049_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/11799313_22","volume-title":"Proc. Fast Software Encryption (FSE) 2006","author":"M. Matsui","year":"2006","unstructured":"M. Matsui, How far can we go on the x64 processors?, in Proc. Fast Software Encryption (FSE) 2006. Lecture Notes in Computer Science, vol. 4047 (Springer, Berlin, 2006), pp. 341\u2013358"},{"key":"9049_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-540-74735-2_9","volume-title":"Proc. Cryptographic Hardware and Embedded Systems (CHES) 2007","author":"M. Matsui","year":"2007","unstructured":"M. Matsui, J. Nakajima, On the power of bitslice implementation on Intel Core2 processor, in Proc. Cryptographic Hardware and Embedded Systems (CHES) 2007. Lecture Notes in Computer Science, vol. 4727 (Springer, Berlin, 2007), pp. 121\u2013134"},{"key":"9049_CR36","unstructured":"R.V. Meushaw, M.S. Schneider, D.N. Simard, G.M. Wagner, Device for and method of secure computing using virtual machines. US patent 6,922,774 (2005)"},{"key":"9049_CR37","unstructured":"Microsoft Corp., Next-generation secure computing base. Web page, \n                    http:\/\/www.microsoft.com\/resources\/ngscb"},{"key":"9049_CR38","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/SFCS.2005.71","volume-title":"Proc. 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS) 2005","author":"M. Naor","year":"2005","unstructured":"M. Naor, G.N. Rothblum, The complexity of online memory checking, in Proc. 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS) 2005 (IEEE, New York, 2005), pp. 573\u2013584"},{"key":"9049_CR39","unstructured":"National Institute of Standards and Technology, Advanced Encryption Standard (AES), FIPS PUB 197 (2001)"},{"key":"9049_CR40","unstructured":"National Institute of Standards and Technology, Secure Hash Standard (SHS), FIPS PUB 180-2 (2002)"},{"key":"9049_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-74462-7_11","volume-title":"Proc. Selected Areas in Cryptography (SAC\u201906)","author":"M. Neve","year":"2006","unstructured":"M. Neve, J.-P. Seifert, Advances on access-driven cache attacks on AES, in Proc. Selected Areas in Cryptography (SAC\u201906). Lecture Notes in Computer Science, vol. 4356 (Springer, Berlin, 2006), pp.\u00a0147\u2013162"},{"key":"9049_CR42","unstructured":"M. Neve, J.-P. Seifert, Z. Wang, A refined look at Bernstein\u2019s AES side-channel analysis. in Proc. ACM Symposium on Information, Computer and Communications Security (2006), p.\u00a0369"},{"key":"9049_CR43","unstructured":"OpenVPN Solutions LLC, OpenVPN\u2014an Open Source SSL VPN Solution by James Yonan. Web site, \n                    http:\/\/openvpn.net"},{"key":"9049_CR44","unstructured":"D.A. Osvik, A. Shamir, E. Tromer, Other people\u2019s cache: Hyper Attacks on HyperThreaded processors. Fast Software Encryption (FSE) 2005 rump session, Feb. 2005"},{"key":"9049_CR45","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Proc. RSA Conference Cryptographers Track (CT-RSA) 2006","author":"D.A. Osvik","year":"2006","unstructured":"D.A. Osvik, A. Shamir, E. Tromer, Cache attacks and countermeasures: the case of AES, in Proc. RSA Conference Cryptographers Track (CT-RSA) 2006. Lecture Notes in Computer Science, vol. 3860 (Springer, Berlin, 2006), pp. 1\u201320"},{"key":"9049_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/11502760_28","volume-title":"Proc. Fast Software Encryption (FSE) 2005","author":"E. Oswald","year":"2005","unstructured":"E. Oswald, S. Mangard, N. Pramstaller, V. Rijmen, A\u00a0side-channel analysis resistant description of the AES S-box, in Proc. Fast Software Encryption (FSE) 2005. Lecture Notes in Computer Science, vol.\u00a03557 (Springer, Berlin, 2005), pp. 413\u2013423"},{"key":"9049_CR47","unstructured":"D. Page, Theoretical use of cache memory as a cryptanalytic side-channel. Technical Report CSTR-02-003, Department of Computer Science, University of Bristol (2002). \n                    http:\/\/www.cs.bris.ac.uk\/Publications\/pub_info.jsp?id=1000625"},{"key":"9049_CR48","doi-asserted-by":"crossref","unstructured":"D. Page, Defending against cache-based side-channel attacks. Information Security Technial Report, vol. 8, issue 8 (2003)","DOI":"10.1016\/S1363-4127(03)00104-3"},{"key":"9049_CR49","unstructured":"D. Page, Partitioned cache architecture as a side-channel defence mechanism. IACR Cryptology ePrint Archive, report 2005\/280 (2005). \n                    http:\/\/eprint.iacr.org\/2005\/280"},{"key":"9049_CR50","unstructured":"C. Percival, Cache missing for fun and profit. BSDCan 2005, Ottawa (2005). See \n                    http:\/\/www.daemonology.net\/hyperthreading-considered-harmful"},{"key":"9049_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/11935070_14","volume-title":"Proc. Cryptology and Network Security (CANS) 2006","author":"C. Rebeiro","year":"2006","unstructured":"C. Rebeiro, D. Selvakumar, A.S.L. Devi, Bitslice implementation of AES, in Proc. Cryptology and Network Security (CANS) 2006. Lecture Notes in Computer Science, vol. 4301 (Springer, Berlin, 2006), pp. 203\u2013212"},{"key":"9049_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-44709-1_16","volume-title":"Proc. Cryptographic Hardware and Embedded Systems (CHES) 2001","author":"A. Rudra","year":"2001","unstructured":"A. Rudra, P.K. Dubey, C.S. Jutla, V. Kumar, J.R. Rao, P. Rohatgi, Efficient Rijndael encryption implementation with composite field arithmetic, in Proc. Cryptographic Hardware and Embedded Systems (CHES) 2001. Lecture Notes in Computer Science, vol. 2162 (Springer, Berlin, 2001), pp. 171\u2013184"},{"key":"9049_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/11605805_14","volume-title":"Proc. RSA Conference Cryptographers Track (CT-RSA) 2006","author":"K. Schramm","year":"2006","unstructured":"K. Schramm, C. Paar, Higher Order Masking of the AES, in Proc. RSA Conference Cryptographers Track (CT-RSA) 2006. Lecture Notes in Computer Science, vol. 3860 (Springer, Berlin, 2006), pp. 208\u2013225"},{"key":"9049_CR54","doi-asserted-by":"crossref","unstructured":"M. Stevens, A. Sotirov, J. Appelbaum, A. Lenstra, D. Molnar, D.A. Osvik, B. de Weger, Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate, in Proc. CRYPTO 2009 (to be published). \n                    http:\/\/www.win.tue.nl\/hashclash\/rogue-ca\/","DOI":"10.1007\/978-3-642-03356-8_4"},{"key":"9049_CR55","unstructured":"Trusted Computing Group, Trusted Computing Group: Home. Web site, \n                    http:\/\/www.trustedcomputinggroup.org"},{"key":"9049_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-45238-6_6","volume-title":"Proc. Cryptographic Hardware and Embedded Systems (CHES) 2003","author":"Y. Tsunoo","year":"2003","unstructured":"Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, H. Miyauchi, Cryptanalysis of DES implemented on computers with cache, in Proc. Cryptographic Hardware and Embedded Systems (CHES) 2003. Lecture Notes in Computer Science, vol. 2779 (Springer, Berlin, 2003), pp. 62\u201376"},{"key":"9049_CR57","unstructured":"Y. Tsunoo, E. Tsujihara, K. Minematsu, H. Miyauchi, Cryptanalysis of block ciphers implemented on computers with cache, in Proc. International Symposium on Information Theory and Its Applications 2002 (2002), pp. 803\u2013806"},{"key":"9049_CR58","doi-asserted-by":"crossref","unstructured":"Y. Tsunoo, E. Tsujihara, M. Shigeri, H. Kubo, K. Minematsu, Improving cache attacks by considering cipher structure. Int. J. Inf. Secur. \u201cOnline First\u201d, Springer, Nov. 2005","DOI":"10.1007\/s10207-005-0079-7"},{"key":"9049_CR59","unstructured":"University of Cambridge Computer Laboratory, The Xen virtual machine monitor. Web site, \n                    http:\/\/www.cl.cam.ac.uk\/research\/srg\/netos\/xen"},{"key":"9049_CR60","unstructured":"A.A. Veith, A.V. Belenko, A. Zhukov, A preview on branch misprediction attacks: using Pentium performance counters to reduce the complexity of timing attacks. CRYPTO\u201906 rump session (2006)"},{"key":"9049_CR61","unstructured":"VMware Inc., VMware: virtualization, virtual machine & virtual server consolidation. Web site, \n                    http:\/\/www.vmware.com"},{"key":"9049_CR62","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-76900-2_15","volume-title":"Proc. Asiacrypt 2007","author":"J. Yang","year":"2007","unstructured":"J. Yang, J. Goodman, Symmetric key cryptography on modern graphics hardware, in Proc. Asiacrypt 2007. Lecture Notes in Computer Science, vol. 4833 (Springer, Berlin, 2007), pp. 249\u2013264"},{"key":"9049_CR63","first-page":"292","volume-title":"Proc. International Conference on Compilers, Architectures and Synthesis for Embedded Systems","author":"X. Zhuang","year":"2004","unstructured":"X. Zhuang, T. Zhang, H.-H.S. Lee, S. Pande, Hardware assisted control flow obfuscation for embedded processors, in Proc. International Conference on Compilers, Architectures and Synthesis for Embedded Systems (ACM, New York, 2004), pp. 292\u2013302"},{"key":"9049_CR64","first-page":"82","volume-title":"Proc. Architectural Support for Programming Languages and Operating Systems","author":"X. Zhuang","year":"2004","unstructured":"X. Zhuang, T. Zhang, S. Pande, HIDE: An Infrastructure for Efficiently protecting information leakage on the address bus, in Proc. Architectural Support for Programming Languages and Operating Systems (ACM, New York, 2004), pp. 82\u201384"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-009-9049-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-009-9049-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-009-9049-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-009-9049-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:43:06Z","timestamp":1586335386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-009-9049-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,23]]},"references-count":64,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1]]}},"alternative-id":["9049"],"URL":"https:\/\/doi.org\/10.1007\/s00145-009-9049-y","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,23]]},"assertion":[{"value":"20 July 2007","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2009","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2009","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}