The following publications are possibly variants of this publication:
- Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional MemoryLe Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang. sp 2015: 3-19 [doi]
- Protecting Private Keys of Dilithium Using Hardware Transactional MemoryLingjia Meng, Yu Fu, Fangyu Zheng, ZiQiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin. isw 2023: 288-306 [doi]
- A Comprehensive Scheme for Contention Management in Hardware Transactional MemoryXiaoqun Wang, Zhenzhou Ji, Chen Fu, Mingzeng Hu. isia 2011: 397-403 [doi]
- An Effective Conflict Management for Large Transactions in Hardware Transactional Memory SystemChen Fu, Dongxin Wen, Xiaoqun Wang, Xiao-Zong Yang. isia 2011: 390-396 [doi]
- GCMS: A Global Contention Management Scheme in Hardware Transactional MemoryXiaoqun Wang, Zhen Ji, Chen Fu, Ming Hu. cal, 10(1):24-27, 2011. [doi]
- Protecting Elliptic Curve Cryptography Against Memory Disclosure AttacksYang Yang, Zhi Guan, Zhe Liu 0001, Zhong Chen. icics 2015: 49-60 [doi]