This paper introduces several novel timing attacks against the common table-driven software implementation of the AES cipher. The attacks use a simplified model of the cache to predict timing variation due to cache-collisions in the sequence of lookups performed by the encryption.