Acoustic Cryptanalysis
- 8 February 2016
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Cryptology
- Vol. 30 (2), 392-443
- https://doi.org/10.1007/s00145-015-9224-2
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- Current Events: Identifying Webpages by Tapping the Electrical OutletLecture Notes in Computer Science, 2013
- Introduction to differential power analysisJournal of Cryptographic Engineering, 2011
- Remote timing attacks are practicalComputer Networks, 2005
- The EM Side—Channel(s)Lecture Notes in Computer Science, 2003
- Template AttacksLecture Notes in Computer Science, 2003
- Small Solutions to Polynomial Equations, and Low Exponent RSA VulnerabilitiesJournal of Cryptology, 1997
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Modular multiplication without trial divisionMathematics of Computation, 1985
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Ultrasonic absorption in air at elevated temperaturesThe Journal of the Acoustical Society of America, 1975