Cited By
View all- Tinoco AGao SShi ECalandrino JTroncoso C(2023)ENIGMAPProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620463(4033-4050)Online publication date: 9-Aug-2023
- Chattopadhyay SBeck MRezine AZeller A(2019)Quantifying the Information Leakage in Cache Attacks via Symbolic ExecutionACM Transactions on Embedded Computing Systems10.1145/328875818:1(1-27)Online publication date: 8-Jan-2019
- Chan TGuo YLin WShi ECzumaj A(2018)Cache-oblivious and data-oblivious sorting and applicationsProceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3174304.3175448(2201-2220)Online publication date: 7-Jan-2018
- Show More Cited By