Security Evaluation of Cryptographic Modules against Profiling AttacksJan 1, 2012ยทYongdae Kim,Naofumi Homma,Takafumi Aoki,Heebong Choiยท 0 min read DOILast updated on Jan 1, 2012 AuthorsYongdae KimAuthorsNaofumi HommaAuthorsTakafumi AokiAuthorsHeebong Choi← Protecting access privacy of cached contents in information centric networks Jan 1, 2012Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous Jan 1, 2012 →