%PDF-1.4
%
1 0 obj
<>stream
application/pdfIEEE2015 IEEE 28th Computer Security Foundations Symposium;2015; ; ;10.1109/CSF.2015.39Rational Protection against Timing AttacksGoran DoychevBoris Kopf
2015 IEEE 28th Computer Security Foundations Symposium526 July 201510.1109/CSF.2015.39536
endstream
endobj
2 0 obj
<>stream
HWMs8WHU|8a6Iek[OrOmQm"*+?x_-R$[:C}PB,8~bq噖ʧQJ-_]Og)W[HS,k|-")JI_,IU'M4EV8>dyΚmVKi7RU}qׄ.a|Bks-OOe@{ƣZlIfw˩g*wꝔv_b
Ѕt,fjl,{Z
4qsk&C{1Wеgˡ͍bSk΄E&eFw/2 F]X2}1:r?\8Dz*9 `9W |W,`Vl!C1hvv[4Wqg#:&@Yͱ[ֆQob)MG6MmXqT}禾 +`,rGI/l.v0Hpg*M1z=XrX}.\;V;blrbHr?^@Oх0UB繻ÌB
=wwPA>i斲Ho9ɍzS4SBwS#SMS˴fd~>%vsR~'z䬗4Au+w:z%y5&ݻ8wzNoR
}.ERͿ^&2ZJnSSXrnZ1R.#gf=%H'Q1F@aE3J"|Uؖ>/w\CN,Ӌm?(g1zCjάkd_qPQ_վ)Ez&̬Dc;@Βs)$BugbڡRVE":a>/LbQΝv
a6RTaF-+pyNab]{Br}=6V/g܊S?5=Ϙ;LipmtSmst{$S
>q&Hjt@yAibw(2GA㨥j11DeB0rVqHYfRCr-
V$ۇrwbfasG_
f}ߏLوaoK2%7']^xQzԘ-ݰꀋȶ!x<ƹ_guIE.V#W\#zö>Ǖ_4wQNrGͥJlWPWwuŷ2M/û/X_eF3jڙY:N0<CH-ƛsaF/>U5g2ɲ k.FVSڿ GBQF:ۓ!i4*.5[1iWu]4ȭ<9uv{Fov뀍2^6)<.[~S1Әšjr"Bb]E`2n|^A4WWI yue^)"-}fyF1h6a jrĕDW8$q)3Xm`
d5 \1I+5HpW5B;CKEB ]GEL4;=2%t4Uju8d5$W(cm=^Ї=wya;3r8Pa?$X4u7edV>vߖl6pF