Remote IP protection using timing channels
From MaRDI portal
Publication:2942840
Recommendations
- Formal methods and automated tool for timing-channel identification in TCB source code
- scientific article; zbMATH DE number 1952757
- Remote attestation on legacy operating systems with trusted platform modules
- An abstract interpretation-based framework for software watermarking
- Tempus fugit: How to plug it
Cites work
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- Power Analysis Attacks
- Predicting Secret Keys Via Branch Prediction
- Protocols for authentification and key establishment
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
This page was built for publication: Remote IP protection using timing channels
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2942840)