-
3
-
-
18844454571
-
Remote timing attacks are practical
-
Brumley, D., Boneh, D.: Remote timing attacks are practical. Computer Networks 48(5), 701-716 (2005)
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
4
-
-
33751508709
-
-
Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: NIST SP 800-57: Recommendation for key management - part 1: General (2012)
-
(2012)
NIST SP 800-57: Recommendation for Key Management - Part 1: General
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
5
-
-
84975609041
-
Acoustic side-channel attacks on printers
-
Backes, M., Dürmuth, M., Gerling, S., Pinkal, M., Sporleder, C.: Acoustic side-channel attacks on printers. In: USENIX Security Symposium, pp. 307-322 (2010)
-
(2010)
USENIX Security Symposium
, pp. 307-322
-
-
Backes, M.1
Dürmuth, M.2
Gerling, S.3
Pinkal, M.4
Sporleder, C.5
-
6
-
-
34547321338
-
Dictionary attacks using keyboard acoustic emanations
-
Berger, Y.,Wool, A., Yeredor, A.: Dictionary attacks using keyboard acoustic emanations. In: ACM Conference on Computer and Communications Security, pp. 245-254 (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Berger, Y.1
Wool, A.2
Yeredor, A.3
-
7
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
Coppersmith, D.: Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptology 10(4), 233-260 (1997)
-
(1997)
J. Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
9
-
-
84905389248
-
-
Genesis 27:5
-
Genesis 27:5
-
-
-
-
10
-
-
84905402231
-
-
GNU multiple precision arithmetic library
-
GNU multiple precision arithmetic library
-
-
-
-
11
-
-
84905379360
-
-
The GNU Privacy Guard
-
The GNU Privacy Guard
-
-
-
-
12
-
-
84904106230
-
RSA key extraction via lowbandwidth acoustic cryptanalysis
-
extended version
-
Genkin, D., Shamir, A., Tromer, E.: RSA key extraction via lowbandwidth acoustic cryptanalysis (extended version). IACR Cryptology ePrint Archive, 2013:857 (2013)
-
(2013)
IACR Cryptology EPrint Archive
, vol.2013
, pp. 857
-
-
Genkin, D.1
Shamir, A.2
Tromer, E.3
-
13
-
-
78650034972
-
On pairing constrained wireless devices based on secrecy of auxiliary channels: The case of acoustic eavesdropping
-
Halevi, T., Saxena, N.: On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping. In: ACM Conference on Computer and Communications Security, pp. 97-108 (2010)
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 97-108
-
-
Halevi, T.1
Saxena, N.2
-
14
-
-
84859464971
-
Introduction to differential power analysis
-
Kocher, P., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. Journal of Cryptographic Engineering 1(1), 5-27 (2011)
-
(2011)
Journal of Cryptographic Engineering
, vol.1
, Issue.1
, pp. 5-27
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
Rohatgi, P.4
-
18
-
-
35248817671
-
Efficient factoring based on partial information
-
Pichler, F. (ed.) EUROCRYPT 1985. Springer, Heidelberg
-
Rivest, R.L., Shamir, A.: Efficient factoring based on partial information. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 31-34. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.219
, pp. 31-34
-
-
Rivest, R.L.1
Shamir, A.2
-
22
-
-
84889002682
-
Flush+reload: A high resolution, low noise, L3 cache side-channel attack
-
Yarom, Y., Falkner, K.E.: Flush+reload: a high resolution, low noise, L3 cache side-channel attack. IACR Cryptology ePrint Archive, 2013:448 (2013)
-
(2013)
IACR Cryptology EPrint Archive
, vol.2013
, pp. 448
-
-
Yarom, Y.1
Falkner, K.E.2
-
23
-
-
33745778686
-
Keyboard acoustic emanations revisited
-
Zhuang, L., Zhou, F., Tygar, J.D.: Keyboard acoustic emanations revisited. In: ACM Conference on Computer and Communications Security, pp. 373-382 (2005)
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 373-382
-
-
Zhuang, L.1
Zhou, F.2
Tygar, J.D.3
|