Caricamento in corso...
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli
Profili
Il mio profilo
La mia biblioteca
Metriche
Avvisi
Impostazioni
Accedi
Accedi
Profili
Il mio profilo
La mia biblioteca
Stefan Mangard
Graz University of Technology
Email verificata su tugraz.at
Citato da 23994
computer security
embedded security
hardware security
side-channel attacks
applied cryptography
Daniel Gruss
Graz University of Technology
Email verificata su iaik.tugraz.at
Citato da 17377
System Security
Systems Security
Computer Security
Side-Channel Attacks
Operating Systems
Michael Schwarz
CISPA Helmholtz Center for Information Security
Email verificata su cispa.de
Citato da 12790
Side-Channel Attacks
Cache Attacks
System Security
Reverse Engineering
Transient Execution
Moritz Lipp
Email verificata su mlq.me
Citato da 10987
Microarchitectural Attacks
Transient Execution
Side-Channel Attacks
Cache Attacks
System Security
Elisabeth Oswald
University of Birmingham and University of Klagenfurt
Email verificata su bham.ac.uk
Citato da 10472
Cryptography
Side Channel Analysis
Side Channel Attacks
Embedded Security
Shivam Bhasin
NTU Singapore
Email verificata su ntu.edu.sg
Citato da 5983
Hardware Security
Cryptography
Side-Channel Attacks
Fault Attacks
Embedded Security
Clémentine Maurice
CNRS
Email verificata su cnrs.fr
Citato da 5752
Microarchitecture Security
Hardware Security
System Security
Side-Channel Attacks
Fault Attacks
Jo Van Bulck
imec-DistriNet, KU Leuven
Email verificata su cs.kuleuven.be
Citato da 5562
Computer security
Trusted computing
Side-channel attacks
Transient execution
Matthieu Rivain
CryptoExperts
Email verificata su cryptoexperts.com
Citato da 5432
Cryptography
Side-Channel Attacks
Junfeng Fan
Open Security Research
Email verificata su opsefy.com
Citato da 3863
Cryptography
Secure Chips
Side-channel Attacks
1 - 10
Privacy
Termini
Guida
Informazioni su Scholar
Guida della Ricerca