From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction., , , , и . CoRR, (2020)Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding., и . ICS, стр. 298-308. Tsinghua University Press, (2011)CacheBleed: a timing attack on OpenSSL constant-time RSA., , и . J. Cryptographic Engineering, 7 (2): 99-112 (2017)Factoring as a Service., , , , , и . IACR Cryptology ePrint Archive, (2015)The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms., , и . IACR Cryptology ePrint Archive, (2018)Lest we remember: cold-boot attacks on encryption keys., , , , , , , , и . Commun. ACM, 52 (5): 91-98 (2009)Elliptic Curve Cryptography in Practice., , , , , и . Financial Cryptography, том 8437 из Lecture Notes in Computer Science, стр. 157-175. Springer, (2014)Torchestra: reducing interactive traffic delays over tor., и . WPES, стр. 31-42. ACM, (2012)Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness.. EVT/WOTE, USENIX Association, (2010)CopyCat: Controlled Instruction-Level Attacks on Enclaves., , , , и . USENIX Security Symposium, стр. 469-486. USENIX Association, (2020)