Daniel

Results: 24996



#Item
1Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-08-28 18:24:31
2Relevant affiliations of the Bank Council members Daniel Lampart, Member of the Bank Council Initial election 2007, current election 2016 Daniel Lampart, Zurich, born 1968, Swiss citizen

Relevant affiliations of the Bank Council members Daniel Lampart, Member of the Bank Council Initial election 2007, current election 2016 Daniel Lampart, Zurich, born 1968, Swiss citizen

Add to Reading List

Source URL: www.snb.ch

Language: English
3F ORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution Jo Van Bulck1 , Marina Minkin2 , Ofir Weisse3 , Daniel Genkin3 , Baris Kasikci3 , Frank Piessens1 , Mark Silberstein2 , Thom

F ORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution Jo Van Bulck1 , Marina Minkin2 , Ofir Weisse3 , Daniel Genkin3 , Baris Kasikci3 , Frank Piessens1 , Mark Silberstein2 , Thom

Add to Reading List

Source URL: foreshadowattack.eu

Language: English - Date: 2018-08-31 11:04:52
4Static Program Analysis for Identifying Energy Bugs in Graphics-Intensive Mobile Apps Chang Hwan Peter Kim, Daniel Kroening, and Marta Kwiatkowska Department of Computer Science, University of Oxford, UK

Static Program Analysis for Identifying Energy Bugs in Graphics-Intensive Mobile Apps Chang Hwan Peter Kim, Daniel Kroening, and Marta Kwiatkowska Department of Computer Science, University of Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2016-07-04 05:12:57
5Conflict-Directed Graph Coverage Daniel Schwartz-Narbonne1 , Martin Sch¨af2 , Dejan Jovanovi´c2 , Philipp R¨ ummer3 , and Thomas Wies1 1

Conflict-Directed Graph Coverage Daniel Schwartz-Narbonne1 , Martin Sch¨af2 , Dejan Jovanovi´c2 , Philipp R¨ ummer3 , and Thomas Wies1 1

Add to Reading List

Source URL: csl.sri.com

Language: English - Date: 2015-02-14 13:21:39
    6Software-basierte Mikroarchitekturangriffe1 Daniel Gruss2 Abstract: Moderne Prozessoren sind hoch optimierte Systeme, bei denen jeder einzelne Rechenzeitzyklus von Bedeutung ist. Viele Optimierungen h¨angen von den Date

    Software-basierte Mikroarchitekturangriffe1 Daniel Gruss2 Abstract: Moderne Prozessoren sind hoch optimierte Systeme, bei denen jeder einzelne Rechenzeitzyklus von Bedeutung ist. Viele Optimierungen h¨angen von den Date

    Add to Reading List

    Source URL: gruss.cc

    Language: German - Date: 2018-09-28 10:46:40
      7Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

      Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

      Add to Reading List

      Source URL: www.lenders.ch

      Language: English - Date: 2017-04-23 04:47:48
      8Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

      Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2018-02-28 05:05:12
      9Increasing Usability of Spin-based C Code Verification Using a Harness Definition Language Leveraging Model-driven Code Checking to Practitioners Daniel Ratiu  Andreas Ulrich

      Increasing Usability of Spin-based C Code Verification Using a Harness Definition Language Leveraging Model-driven Code Checking to Practitioners Daniel Ratiu Andreas Ulrich

      Add to Reading List

      Source URL: mbeddr.com

      Language: English - Date: 2018-08-02 04:06:51
      10Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai

      Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2014-03-20 23:52:12