메뉴 건너뛰기




Volumn 8616 LNCS, Issue PART 1, 2014, Pages 444-461

RSA key extraction via low-bandwidth acoustic cryptanalysis

Author keywords

[No Author keywords available]

Indexed keywords

MICROPHONES;

EID: 84905374631     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44371-2_25     Document Type: Conference Paper
Times cited : (259)

References (23)
  • 3
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • Brumley, D., Boneh, D.: Remote timing attacks are practical. Computer Networks 48(5), 701-716 (2005)
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 7
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • Coppersmith, D.: Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptology 10(4), 233-260 (1997)
    • (1997) J. Cryptology , vol.10 , Issue.4 , pp. 233-260
    • Coppersmith, D.1
  • 9
    • 84905389248 scopus 로고    scopus 로고
    • Genesis 27:5
    • Genesis 27:5
  • 10
    • 84905402231 scopus 로고    scopus 로고
    • GNU multiple precision arithmetic library
    • GNU multiple precision arithmetic library
  • 11
    • 84905379360 scopus 로고    scopus 로고
    • The GNU Privacy Guard
    • The GNU Privacy Guard
  • 12
    • 84904106230 scopus 로고    scopus 로고
    • RSA key extraction via lowbandwidth acoustic cryptanalysis
    • extended version
    • Genkin, D., Shamir, A., Tromer, E.: RSA key extraction via lowbandwidth acoustic cryptanalysis (extended version). IACR Cryptology ePrint Archive, 2013:857 (2013)
    • (2013) IACR Cryptology EPrint Archive , vol.2013 , pp. 857
    • Genkin, D.1    Shamir, A.2    Tromer, E.3
  • 13
    • 78650034972 scopus 로고    scopus 로고
    • On pairing constrained wireless devices based on secrecy of auxiliary channels: The case of acoustic eavesdropping
    • Halevi, T., Saxena, N.: On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping. In: ACM Conference on Computer and Communications Security, pp. 97-108 (2010)
    • (2010) ACM Conference on Computer and Communications Security , pp. 97-108
    • Halevi, T.1    Saxena, N.2
  • 18
    • 35248817671 scopus 로고
    • Efficient factoring based on partial information
    • Pichler, F. (ed.) EUROCRYPT 1985. Springer, Heidelberg
    • Rivest, R.L., Shamir, A.: Efficient factoring based on partial information. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 31-34. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.219 , pp. 31-34
    • Rivest, R.L.1    Shamir, A.2
  • 22
    • 84889002682 scopus 로고    scopus 로고
    • Flush+reload: A high resolution, low noise, L3 cache side-channel attack
    • Yarom, Y., Falkner, K.E.: Flush+reload: a high resolution, low noise, L3 cache side-channel attack. IACR Cryptology ePrint Archive, 2013:448 (2013)
    • (2013) IACR Cryptology EPrint Archive , vol.2013 , pp. 448
    • Yarom, Y.1    Falkner, K.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.