Cited By
View all- Christou GVasiliadis GZarras AIoannidis S(2025)iVault: Architectural Code Concealing Techniques to Protect Cryptographic KeysEmbedded Computer Systems: Architectures, Modeling, and Simulation10.1007/978-3-031-78380-7_13(152-164)Online publication date: 28-Jan-2025
- Lim HKim JLee HLuo BLiao XXu JKirda ELie D(2024)uMMU: Securing Data Confidentiality with Unobservable Memory SubsystemProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690340(2993-3007)Online publication date: 2-Dec-2024
- Sekar GJoseph MBalasubramanian R(2024)Fault-assisted side-channel analysis of HMAC-StreebogCryptologia10.1080/01611194.2024.232854849:2(153-169)Online publication date: 14-Apr-2024
- Show More Cited By