Cited By
View all- Fan HWang WWang YWang XGao Y(2024)Cache attacks on subkey calculation of BlowfishJournal of Computer Security10.3233/JCS-23005232:2(165-191)Online publication date: 9-Apr-2024
- Mosquera Ferrandiz F(2024)A Study of Mitigation Methods for Speculative Cache Side Channel Attacksundefined10.12794/metadc2332527Online publication date: May-2024
- Wei SHarris AZhu YRamrakhyani PLin CTiwari M(2024)Tail Victims in Termination Timing Channel Defenses Beyond Cryptographic Kernels2024 International Symposium on Secure and Private Execution Environment Design (SEED)10.1109/SEED61283.2024.00012(11-22)Online publication date: 16-May-2024
- Show More Cited By