{"id":"https://openalex.org/W2963534038","doi":"https://doi.org/10.3233/jcs-191296","title":"Towards the optimal performance of integrating <scp>Warm</scp> and <scp>Delay</scp> against remote cache timing side channels on block ciphers","display_name":"Towards the optimal performance of integrating <scp>Warm</scp> and <scp>Delay</scp> against remote cache timing side channels on block ciphers","publication_year":2019,"publication_date":"2019-07-17","ids":{"openalex":"https://openalex.org/W2963534038","doi":"https://doi.org/10.3233/jcs-191296","mag":"2963534038"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-191296","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-191296","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037021459","display_name":"Ziqiang Ma","orcid":"https://orcid.org/0000-0002-1497-8427"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziqiang Ma","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China","School of Cyber Security, University of Chinese Academy of Sciences, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0,\u00a0,\u00a0","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0maziqiang@iie.ac.cn,\u00a0caiquanwei@iie.ac.cn,\u00a0linjingqiang@iie.ac.cn"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0,\u00a0,\u00a0","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0maziqiang@iie.ac.cn,\u00a0caiquanwei@iie.ac.cn,\u00a0linjingqiang@iie.ac.cn","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027215089","display_name":"Quanwei Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Quanwei Cai","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0,\u00a0,\u00a0","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0maziqiang@iie.ac.cn,\u00a0caiquanwei@iie.ac.cn,\u00a0linjingqiang@iie.ac.cn"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0,\u00a0,\u00a0","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0maziqiang@iie.ac.cn,\u00a0caiquanwei@iie.ac.cn,\u00a0linjingqiang@iie.ac.cn","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036002145","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-1508-4879"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China","School of Cyber Security, University of Chinese Academy of Sciences, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0,\u00a0,\u00a0","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0maziqiang@iie.ac.cn,\u00a0caiquanwei@iie.ac.cn,\u00a0linjingqiang@iie.ac.cn"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0,\u00a0,\u00a0","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails:\u00a0maziqiang@iie.ac.cn,\u00a0caiquanwei@iie.ac.cn,\u00a0linjingqiang@iie.ac.cn","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052233895","display_name":"Bo Luo","orcid":"https://orcid.org/0000-0001-8196-2436"},"institutions":[{"id":"https://openalex.org/I146416000","display_name":"University of Kansas","ror":"https://ror.org/001tmjg57","country_code":"US","type":"education","lineage":["https://openalex.org/I146416000"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bo Luo","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Kansas, USA. E-mail:\u00a0","Department of Electrical Engineering and Computer Science, University of Kansas, USA. E-mail:\u00a0bluo@ku.edu"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Kansas, USA. E-mail:\u00a0","institution_ids":["https://openalex.org/I146416000"]},{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Kansas, USA. E-mail:\u00a0bluo@ku.edu","institution_ids":["https://openalex.org/I146416000"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033745290","display_name":"Jiwu Jing","orcid":"https://orcid.org/0000-0002-3409-6149"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Jing","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China","School of Computer Science, University of Chinese Academy of Sciences, China. E-mail:\u00a0","School of Computer Science, University of Chinese Academy of Sciences, China. E-mail:\u00a0jing@is.ac.cn"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Computer Science, University of Chinese Academy of Sciences, China. E-mail:\u00a0","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"School of Computer Science, University of Chinese Academy of Sciences, China. E-mail:\u00a0jing@is.ac.cn","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5027215089"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.09706971,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"27","issue":"5","first_page":"547","last_page":"580"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8682258725166321},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7319754362106323},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5587770938873291},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5410541296005249},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.508756697177887},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4895535409450531},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4818645417690277},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.47810858488082886},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.47245457768440247},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.44356536865234375},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.43892398476600647},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4376453459262848},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.41796618700027466},{"id":"https://openalex.org/keywords/cache-invalidation","display_name":"Cache invalidation","score":0.4169454872608185},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3990130126476288},{"id":"https://openalex.org/keywords/cpu-cache","display_name":"CPU cache","score":0.3734745383262634},{"id":"https://openalex.org/keywords/cache-algorithms","display_name":"Cache algorithms","score":0.33185774087905884},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3155081570148468},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3045066297054291},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18217888474464417}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8682258725166321},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7319754362106323},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5587770938873291},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5410541296005249},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.508756697177887},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4895535409450531},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4818645417690277},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.47810858488082886},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.47245457768440247},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.44356536865234375},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.43892398476600647},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4376453459262848},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.41796618700027466},{"id":"https://openalex.org/C25536678","wikidata":"https://www.wikidata.org/wiki/Q5015977","display_name":"Cache invalidation","level":5,"score":0.4169454872608185},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3990130126476288},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.3734745383262634},{"id":"https://openalex.org/C38556500","wikidata":"https://www.wikidata.org/wiki/Q13404475","display_name":"Cache algorithms","level":4,"score":0.33185774087905884},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3155081570148468},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3045066297054291},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18217888474464417},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-191296","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-191296","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W50107694","https://openalex.org/W52769613","https://openalex.org/W130371449","https://openalex.org/W412848083","https://openalex.org/W1427174644","https://openalex.org/W1488058190","https://openalex.org/W1490070390","https://openalex.org/W1523982624","https://openalex.org/W1527701244","https://openalex.org/W1572300106","https://openalex.org/W1584476834","https://openalex.org/W1613874182","https://openalex.org/W1716219110","https://openalex.org/W1821583647","https://openalex.org/W1824405704","https://openalex.org/W1934458198","https://openalex.org/W1972622169","https://openalex.org/W1992291252","https://openalex.org/W1994390420","https://openalex.org/W1995727142","https://openalex.org/W1997493523","https://openalex.org/W1998955763","https://openalex.org/W2003932062","https://openalex.org/W2011257923","https://openalex.org/W2011408938","https://openalex.org/W2025849355","https://openalex.org/W2034195502","https://openalex.org/W2062463502","https://openalex.org/W2073524356","https://openalex.org/W2097778649","https://openalex.org/W2103289002","https://openalex.org/W2103820503","https://openalex.org/W2107691219","https://openalex.org/W2111160280","https://openalex.org/W2116807588","https://openalex.org/W2119028650","https://openalex.org/W2126132644","https://openalex.org/W2128255161","https://openalex.org/W2131202839","https://openalex.org/W2132064685","https://openalex.org/W2135744598","https://openalex.org/W2146573211","https://openalex.org/W2149362621","https://openalex.org/W2149517094","https://openalex.org/W2159054268","https://openalex.org/W2166293920","https://openalex.org/W2171690178","https://openalex.org/W2172060328","https://openalex.org/W2208250432","https://openalex.org/W2242066295","https://openalex.org/W2255548496","https://openalex.org/W2337480911","https://openalex.org/W2751989915","https://openalex.org/W2889508486","https://openalex.org/W3029178570","https://openalex.org/W3145598683","https://openalex.org/W4210486447","https://openalex.org/W6698749839"],"related_works":["https://openalex.org/W2029006445","https://openalex.org/W4253685677","https://openalex.org/W1971956962","https://openalex.org/W4387031668","https://openalex.org/W2188560665","https://openalex.org/W2887442533","https://openalex.org/W4297042454","https://openalex.org/W169923757","https://openalex.org/W3028997697","https://openalex.org/W4255075415"],"abstract_inverted_index":{"Cache":[0],"timing":[1,36,102],"side":[2,37,103,135],"channels":[3,38,104],"allow":[4],"a":[5],"remote":[6,34,100],"attacker":[7],"to":[8,83,88,123,141,149],"disclose":[9],"the":[10,16,21,44,47,51,58,71,85,94,113,121,126,138,155,159,163,185,197,210,218],"cryptographic":[11,74],"keys,":[12],"by":[13,57,77],"repeatedly":[14],"invoking":[15],"encryption/decryption":[17],"functions":[18,75],"and":[19,25,30,50,79,81,131,144,146,205,207],"measuring":[20],"execution":[22,48,186],"time.":[23],"Warm":[24,78,130,143,204],"Delay":[26,132],"are":[27,55],"two":[28,91],"algorithm-independent":[29],"implementation-transparent":[31],"countermeasures":[32,92],"against":[33,133],"cache-based":[35],"for":[39,105],"block":[40,106],"ciphers.":[41],"They":[42],"destroy":[43],"relationship":[45],"between":[46],"time":[49,187],"cache":[52,101,134,193],"misses/hits":[53],"which":[54],"determined":[56],"secret":[59],"key,":[60],"but":[61],"bring":[62],"remarkable":[63],"performance":[64,72,96,127,161],"overhead.":[65],"In":[66],"this":[67,118],"paper,":[68],"we":[69,171],"investigate":[70],"of":[73,115,128,203],"protected":[76],"Delay,":[80,145,206],"attempt":[82],"find":[84],"best":[86,114],"strategy":[87],"integrate":[89,142],"these":[90],"with":[93,109,162,176],"optimal":[95,139,160],"while":[97],"effectively":[98],"eliminate":[99],"ciphers":[107],"implementations":[108],"lookup":[110],"tables.":[111],"To":[112],"our":[116],"knowledge,":[117],"work":[119],"is":[120,152],"first":[122],"systematically":[124],"analyze":[125],"integrating":[129],"channels.We":[136],"derive":[137],"scheme":[140,157,198],"apply":[147],"it":[148,173],"AES.":[150],"It":[151],"proven":[153],"that":[154],"integration":[156,201],"achieves":[158],"least":[164],"extra":[165],"operations":[166,216],"on":[167,174,192,217],"commodity":[168],"systems.":[169],"Finally,":[170],"implement":[172],"Linux":[175],"Intel":[177],"CPUs.":[178],"Experimental":[179],"results":[180],"confirm":[181],"that,":[182],"(":[183,195,208],"a)":[184],"does":[188],"not":[189],"leak":[190],"information":[191],"access,":[194],"b)":[196],"outperforms":[199],"other":[200],"strategies":[202],"c)":[209],"implementation":[211],"works":[212],"without":[213],"any":[214],"privileged":[215],"computer.":[219]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-07-30T00:00:00"}
