Daniel

Results: 24996



#Item
1Cryptography / Exponentials / Cross-platform software / Cryptographic software / GNU Privacy Guard / OpenPGP / Privacy software / RSA / Exponentiation by squaring / Modular exponentiation / ElGamal encryption / Chosen-ciphertext attack

Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-08-28 18:24:31
2Insurance / Insurance industry

Relevant affiliations of the Bank Council members Daniel Lampart, Member of the Bank Council Initial election 2007, current election 2016 Daniel Lampart, Zurich, born 1968, Swiss citizen

Add to Reading List

Source URL: www.snb.ch

Language: English
3Computer architecture / Computing / Computer hardware / Computer memory / Cache / Computer security / X86 architecture / Central processing unit / Software Guard Extensions / Meltdown / CPU cache / Spectre

F ORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution Jo Van Bulck1 , Marina Minkin2 , Ofir Weisse3 , Daniel Genkin3 , Baris Kasikci3 , Frank Piessens1 , Mark Silberstein2 , Thom

Add to Reading List

Source URL: foreshadowattack.eu

Language: English - Date: 2018-08-31 11:04:52
4Computing / Computer graphics / 3D rendering / Video game development / Computer programming / Graphics hardware / Graphics libraries / Texture atlas / Graphics processing unit / Texture mapping / Optimizing compiler / Rendering

Static Program Analysis for Identifying Energy Bugs in Graphics-Intensive Mobile Apps Chang Hwan Peter Kim, Daniel Kroening, and Marta Kwiatkowska Department of Computer Science, University of Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2016-07-04 05:12:57
5

Conflict-Directed Graph Coverage Daniel Schwartz-Narbonne1 , Martin Sch¨af2 , Dejan Jovanovi´c2 , Philipp R¨ ummer3 , and Thomas Wies1 1

Add to Reading List

Source URL: csl.sri.com

Language: English - Date: 2015-02-14 13:21:39
    6

    Software-basierte Mikroarchitekturangriffe1 Daniel Gruss2 Abstract: Moderne Prozessoren sind hoch optimierte Systeme, bei denen jeder einzelne Rechenzeitzyklus von Bedeutung ist. Viele Optimierungen h¨angen von den Date

    Add to Reading List

    Source URL: gruss.cc

    Language: German - Date: 2018-09-28 10:46:40
      7Aircraft instruments / Aviation / Avionics / Technology / Electronics / ACARS / ARINC / VHF Data Link / SATCOM / Data link / Pilot report / Flight plan

      Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

      Add to Reading List

      Source URL: www.lenders.ch

      Language: English - Date: 2017-04-23 04:47:48
      8Cryptography / Public-key cryptography / Elliptic curve cryptography / Digital Signature Standard / Key management / Elliptic Curve Digital Signature Algorithm / Digital signature / Digital Signature Algorithm / EdDSA / Key / Domain Name System Security Extensions / Homomorphic encryption

      Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2018-02-28 05:05:12
      9Model checkers / Computing / Theoretical computer science / Software engineering / Formal methods / Promela / SPIN model checker / Model checking / Guard / Certificate / Formal verification / Printf format string

      Increasing Usability of Spin-based C Code Verification Using a Harness Definition Language Leveraging Model-driven Code Checking to Practitioners Daniel Ratiu Andreas Ulrich

      Add to Reading List

      Source URL: mbeddr.com

      Language: English - Date: 2018-08-02 04:06:51
      10Circuit complexity / Theoretical computer science / Computational complexity theory / Cryptographic protocols / Electronic engineering / Theory of computation / Secure multi-party computation / Logic families / Digital circuits / Transistortransistor logic / NC / Circuit

      Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2014-03-20 23:52:12
      UPDATE