@inproceedings{benporat:hal-01531139, TITLE = {{On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks}}, AUTHOR = {Ben-Porat, Udi and Bremler-Barr, Anat and Levy, Hanoch and Plattner, Bernhard}, URL = {https://inria.hal.science/hal-01531139}, NOTE = {Part 3: Reliability and Resilience}, BOOKTITLE = {{11th International Networking Conference (NETWORKING)}}, ADDRESS = {Prague, Czech Republic}, EDITOR = {Robert Bestak and Lukas Kencl and Li Erran Li and Joerg Widmer and Hao Yin}, PUBLISHER = {{Springer}}, SERIES = {NETWORKING 2012}, VOLUME = {LNCS-7289}, NUMBER = {Part I}, PAGES = {135-148}, YEAR = {2012}, MONTH = May, DOI = {10.1007/978-3-642-30045-5\_11}, PDF = {https://inria.hal.science/hal-01531139/file/978-3-642-30045-5_11_Chapter.pdf}, HAL_ID = {hal-01531139}, HAL_VERSION = {v1}, }