|
|
@@ -1,21 +1,3 @@
|
|
|
-@article{10.1007/s10766-018-0611-9,
|
|
|
- address = {USA},
|
|
|
- author = {Moghimi, Ahmad and Wichelmann, Jan and Eisenbarth, Thomas and Sunar, Berk},
|
|
|
- doi = {10.1007/s10766-018-0611-9},
|
|
|
- issn = {0885-7458},
|
|
|
- issue_date = {August 2019},
|
|
|
- keyword = {Microarchitectural side channels, Side-channel attacks, Cache, False dependency, Timing attack, 4K Aliasing},
|
|
|
- month = {August},
|
|
|
- number = {4},
|
|
|
- numpages = {33},
|
|
|
- pages = {538–570},
|
|
|
- publisher = {Kluwer Academic Publishers},
|
|
|
- title = {MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations},
|
|
|
- url = {https://doi.org/10.1007/s10766-018-0611-9},
|
|
|
- volume = {47},
|
|
|
- year = {2019}
|
|
|
-}
|
|
|
-
|
|
|
@misc{7cpua57,
|
|
|
author = {{7-cpu}},
|
|
|
title = {ARM Cortex-A57},
|