Login / Signup
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
Daniel Genkin
Lev Pachmanov
Itamar Pipman
Eran Tromer
Published in:
CHES (2015)
Keyphrases
</>
electromagnetic field
countermeasures
garbage collection
malicious attacks
watermarking scheme
high end
traffic analysis
fourier transform
malicious users
low cost
wireless communication
watermarking algorithm
finite element method