Date: 2015-03-03 02:38:59Cryptography Cryptographic software OpenPGP Side-channel attacks E-commerce RSA Modular exponentiation Chosen-ciphertext attack ElGamal encryption Adaptive chosen-ciphertext attack Electromagnetic attack Public-key cryptography | | Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev PachmanovAdd to Reading ListSource URL: www.cs.tau.ac.ilDownload Document from Source Website File Size: 1,97 MBShare Document on Facebook
|