RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Top Cited Papers
- 1 January 2014
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 9 references indexed in Scilit:
- RSA Key Extraction via Low-Bandwidth Acoustic CryptanalysisLecture Notes in Computer Science, 2014
- Recommendation for key management, part 1 :Published by National Institute of Standards and Technology (NIST) ,2012
- Introduction to differential power analysisJournal of Cryptographic Engineering, 2011
- On pairing constrained wireless devices based on secrecy of auxiliary channelsPublished by Association for Computing Machinery (ACM) ,2010
- Efficient Factoring Based on Partial InformationPublished by Springer Science and Business Media LLC ,2007
- Dictionary attacks using keyboard acoustic emanationsPublished by Association for Computing Machinery (ACM) ,2006
- Keyboard acoustic emanations revisitedPublished by Association for Computing Machinery (ACM) ,2005
- Remote timing attacks are practicalComputer Networks, 2005
- Small Solutions to Polynomial Equations, and Low Exponent RSA VulnerabilitiesJournal of Cryptology, 1997