Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
Daniel GenkinLev PachmanovItamar PipmanEran TromerPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- electromagnetic field
- low cost
- countermeasures
- wireless communication
- traffic analysis
- personal computer
- garbage collection
- malicious users
- pc cluster
- high frequency
- denial of service attacks
- simulation software
- security risks
- security threats
- wireless systems
- security mechanisms
- malicious attacks
- watermarking algorithm
- xml keys
- hash functions
- chosen plaintext