Cold Boot Attacks in the Discrete Logarithm Setting
From MaRDI portal
Publication:2790059
DOI10.1007/978-3-319-16715-2_24zbMath1382.94155OpenAlexW2283459741MaRDI QIDQ2790059
Bertram Poettering, Dale L. Sibborn
Publication date: 2 March 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16715-2_24
Related Items (2)
Recovering secrets from prefix-dependent leakage ⋮ Cold Boot Attacks in the Discrete Logarithm Setting
Cites Work
- Cold Boot Attacks in the Discrete Logarithm Setting
- Correcting Errors in Private Keys Obtained from Cold Boot Attacks
- Reconstructing RSA Private Keys from Random Key Bits
- Correcting Errors in RSA Private Keys
- An Improved Recovery Algorithm for Decayed AES Key Schedule Images
- Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
- A Coding-Theoretic Approach to Recovering Noisy RSA Keys
- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
- RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
- Information Security Practice and Experience
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Cold Boot Attacks in the Discrete Logarithm Setting