Nondeterministic Multithreading
暂无分享,去创建一个
[1] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[2] Henk L. Muller,et al. Random Register Renaming to Foil DPA , 2001, CHES.
[3] Nigel P. Smart,et al. Instruction stream mutation for non-deterministic processors , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.
[4] Janusz S. Kowalik,et al. Parallel MIMD computation : the HEP supercomputer and its applications , 1985 .
[5] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[6] Jean-Pierre Seifert,et al. On the power of simple branch prediction analysis , 2007, ASIACCS '07.
[7] David Schultz,et al. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks , 2005, ICISC.
[8] Onur Aciiçmez,et al. Predicting Secret Keys Via Branch Prediction , 2007, CT-RSA.
[9] Daniel William Towner,et al. The 'uniform heterogeneous multi-threaded' processor architecture , 2001 .
[10] Henk L. Muller,et al. Non-deterministic Processors , 2001, ACISP.
[11] Hiroshi Miyauchi,et al. Cryptanalysis of DES Implemented on Computers with Cache , 2003, CHES.
[12] Gregory T. Byrd,et al. Multithreaded processor architectures , 1995 .
[13] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[14] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[15] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[16] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .