Author:
Boneh Dan,DeMillo Richard A.,Lipton Richard J.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Cited by
296 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Passive SSH Key Compromise via Lattices;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
2. A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost;Journal of Cryptographic Engineering;2023-11-04
3. Darknet signatures;2023 International Conference on Data Security and Privacy Protection (DSPP);2023-10-16
4. Continuously non-malleable codes from block ciphers in split-state model;Cybersecurity;2023-10-01
5. Jolt: Recovering TLS Signing Keys via Rowhammer Faults;2023 IEEE Symposium on Security and Privacy (SP);2023-05