Acoustic cryptanalysis
From MaRDI portal
Publication:2397444
DOI10.1007/S00145-015-9224-2zbMath1377.94048OpenAlexW2912147118MaRDI QIDQ2397444
Daniel Genkin, Eran Tromer, Adi Shamir
Publication date: 22 May 2017
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-015-9224-2
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Small solutions to polynomial equations, and low exponent RSA vulnerabilities
- Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- Modular Multiplication Without Trial Division
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Efficient Factoring Based on Partial Information
- Lognormal genesis
- A method for obtaining digital signatures and public-key cryptosystems
- Power Analysis Attacks
This page was built for publication: Acoustic cryptanalysis