• Black-box separations and their adaptability to the non-uniform modelBuldas, Ahto; Niitsoo, MargusInformation security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings2013 / p. 152-167 https://doi.org/10.1007/978-3-642-39059-3_11 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84884494636&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1007%2F978-3-642-39059-3_11%29&sessionSearchId=08e7c58f88aea92900d731f06ee215ed
  • A security verification template to assess cache architecture vulnerabilitiesGhasempouri, Tara; Raik, Jaan; Paul, Kolin; Reinbrecht, Cezar; Hamdioui, Said; Taouil, M.2020 23rd International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), April 22nd – 24th 2020 Novi Sad, Serbia : Proceedings2020 / art. 9095707, 6 p https://doi.org/10.1109/DDECS50862.2020.9095707