<--- Back to Details
First PageDocument Content
Cryptography / Side-channel attacks / Public-key cryptography / Applied mathematics / RSA / Electromagnetic attack / GNU Privacy Guard / Chosen-ciphertext attack / Power analysis / Blinding / Elliptic-curve cryptography / Advanced Encryption Standard
Date: 2017-08-28 17:33:56
Cryptography
Side-channel attacks
Public-key cryptography
Applied mathematics
RSA
Electromagnetic attack
GNU Privacy Guard
Chosen-ciphertext attack
Power analysis
Blinding
Elliptic-curve cryptography
Advanced Encryption Standard

contributed articles DOI:Computers broadcast their secrets via inadvertent physical emanations that are easily measured and exploited.

Add to Reading List

Source URL: web.eecs.umich.edu

Download Document from Source Website

File Size: 3,98 MB

Share Document on Facebook

Similar Documents

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1  University of Cincinnati and Technische Universität Darmstadt

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

DocID: 1xVV9 - View Document

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1  3

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

DocID: 1xVNp - View Document

Multivariate Public Key Cryptography Jintai Ding 1  2

Multivariate Public Key Cryptography Jintai Ding 1 2

DocID: 1xVdX - View Document

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

DocID: 1xTwC - View Document

Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

DocID: 1vi5X - View Document