{"title":"Attacking AES Using Bernstein's Attack on Modern Processors","authors":"H. Aly, M. ElGayyar","doi":"10.1007/978-3-642-38553-7_7","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Cryptology in Africa","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/978-3-642-38553-7_7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}