Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
- 1 September 2015
- book chapter
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCsLecture Notes in Computer Science, 2014
- Current Events: Identifying Webpages by Tapping the Electrical OutletLecture Notes in Computer Science, 2013
- Horizontal Correlation Analysis on ExponentiationLecture Notes in Computer Science, 2010
- Power Attack on Small RSA Public ExponentLecture Notes in Computer Science, 2006
- Remote timing attacks are practicalComputer Networks, 2005
- The EM Side—Channel(s)Lecture Notes in Computer Science, 2003
- Universal Exponentiation Algorithm A First Step towards Provable SPA-ResistanceLecture Notes in Computer Science, 2001
- Electromagnetic Analysis: Concrete ResultsLecture Notes in Computer Science, 2001
- Towards Sound Approaches to Counteract Power-Analysis AttacksLecture Notes in Computer Science, 1999
- Small Solutions to Polynomial Equations, and Low Exponent RSA VulnerabilitiesJournal of Cryptology, 1997