C. Arnaud and P. Fouque, Timing attack against protected RSA-CRT implementation used in polarssl, Topics in Cryptology -CT-RSA 2013 -The Cryptographers' Track at the RSA Conference, vol.7779, pp.18-33, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01094300

D. J. Bernstein, J. Breitner, D. Genkin, L. G. Bruinderink, N. Heninger et al., Sliding Right into Disaster: Left-to-Right Sliding Windows Leak, Cryptographic Hardware and Embedded Systems -CHES 2017 -19th International Conference, vol.10529, pp.555-576, 2017.

E. Biham and A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, Advances in Cryptology -CRYPTO '97, p.17

, Annual International Cryptology Conference, vol.1294, pp.513-525, 1997.

D. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract), Lecture Notes in Computer Science, vol.1233, pp.37-51, 1997.

B. B. Brumley and N. Tuveri, Remote Timing Attacks Are Still Practical, Lecture Notes in Computer Science, vol.6879, pp.355-371, 2011.

F. Dall, G. D. Micheli, T. Eisenbarth, D. Genkin, N. Heninger et al., CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks, IACR Trans. Cryptogr. Hardw. Embed. Syst, vol.2018, issue.2, pp.171-191, 2018.

J. Danger, N. Debande, S. Guilley, and Y. Souissi, Highorder Timing Attacks, Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 '14, pp.7-12, 2014.

J. Danger, Y. E. Housni, A. Facon, C. T. Gueye, S. Guilley et al., On the Performance and Security of Multiplication in GF (2 N ), Cryptography, vol.2, issue.3, p.25, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02288010

M. Dugardin, S. Guilley, J. Danger, Z. Najm, and O. Rioul, Correlated Extra-Reductions Defeat Blinded Regular Exponentiation, Cryptographic Hardware and Embedded Systems -CHES 2016 -18th International Conference, vol.9813, pp.3-22, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01362463

A. Facon, S. Guilley, M. Lec'hvien, D. Marion, and T. Perianin, Binary Data Analysis for Source Code Leakage Assessment, Innovative Security Solutions for Information Technology and Communications -11th International Conference, vol.11359, pp.391-409, 2018.

A. Facon, S. Guilley, M. Lec'hvien, A. Schaub, and Y. Souissi, Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms, 3rd IEEE International Verification and Security Workshop, pp.7-12, 2018.

C. Pereida-garcía, B. B. Brumley, and Y. Yarom, make sure DSA signing exponentiations really are constant-time, vol.25, pp.1639-1650

Q. Ge, Y. Yarom, D. Cock, and G. Heiser, A survey of microarchitectural timing attacks and countermeasures on contemporary hardware, J. Cryptographic Engineering, vol.8, issue.1, pp.1-27, 2018.

D. Gruss, C. Maurice, A. Fogh, M. Lipp, and S. Mangard, Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR, vol.25, pp.368-379

D. Gruss, C. Maurice, K. Wagner, and S. Mangard, Flush+Flush: A Fast and Stealthy Cache Attack, Detection of Intrusions and Malware, and Vulnerability Assessment -13th International Conference, DIMVA 2016, vol.9721, pp.279-299, 2016.

, Description: Secure Transport failed to validate the authenticity of the connection. This issue was addressed by restoring missing validation steps. Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS, 2014.

, Fault Analysis in Cryptography. Information Security and Cryptography, 2012.

C. Paul, . Kocher-;-hellman, D. Rsa, and O. Systems, Timing Attacks on, Advances in Cryptology -CRYPTO '96, 16th Annual International Cryptology Conference, vol.1109, pp.104-113, 1996.

C. Paul, J. Kocher, and B. Jaffe, Differential power analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999.

C. Maurice and M. Lipp, What could possibly go wrong with <insert x86 instruction here>?, 2016.

C. Maurice, M. Weber, M. Schwarz, L. Giner, D. Gruss et al., Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud, 24th Annual Network and Distributed System Security Symposium, 2017.

S. Takarabt, A. Schaub, A. Facon, S. Guilley, L. Sauvage et al., Cache-Timing Attacks still threaten IoT devices, Codes, Cryptology and Information Security -Third International Conference, vol.2, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02319488

E. Tromer, A. Dag, A. Osvik, and . Shamir, Efficient Cache Attacks on AES, and Countermeasures, J. Cryptology, vol.23, issue.1, pp.37-71, 2010.

C. D. Walter, Sliding Windows Succumbs to Big Mac Attack, Lecture Notes in Computer Science, vol.2162, pp.286-299, 2001.

E. R. Weippl, S. Katzenbeisser, C. Kruegel, A. C. Myers, and S. Halevi, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016.