Overview of attacks on unencumbered cryptographic means and their prevention - Can the circle be squared?
暂无分享,去创建一个
[1] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[2] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[3] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[4] Charles P. Pfleeger,et al. Security in computing , 1988 .
[5] I N Bronstein,et al. Taschenbuch der Mathematik , 1966 .
[6] Markus G. Kuhn,et al. Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[7] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[8] Eran Tromer,et al. Acoustic cryptanalysis : on nosy people and noisy machines , 2004 .
[9] William Stallings,et al. Cryptography and network security , 1998 .
[10] Jean-Pierre Seifert,et al. On the power of simple branch prediction analysis , 2007, ASIACCS '07.
[11] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[12] Patrick F. Dunn,et al. Measurement and Data Analysis for Engineering and Science , 2017 .