Follow
Itamar Pipman
Title
Cited by
Cited by
Year
Get your hands off my laptop: physical side-channel key-extraction attacks on pcs: Extended version
D Genkin, I Pipman, E Tromer
Journal of Cryptographic Engineering 5, 95-112, 2015
2482015
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2442016
Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
2262015
ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs
D Genkin, L Pachmanov, I Pipman, E Tromer
Topics in Cryptology-CT-RSA 2016: The Cryptographers' Track at the RSA …, 2016
1132016
Physical key extraction attacks on PCs
D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer
Communications of the ACM 59 (6), 70-79, 2016
682016
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer
Communications of the ACM 59 (6), 70-79, 2016
12016
Future Cyberdefenses Will Defeat Cyberattacks on PCs Response
D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer
COMMUNICATIONS OF THE ACM 59 (8), 8-8, 2016
2016
Physical Key Extraction Attacks on PCs Computers broadcast their secrets via inadvertent physical emanations that are easily measured and exploited.
D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer
The system can't perform the operation now. Try again later.
Articles 1–8