-
1دورية أكاديمية
المؤلفون: Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
مصطلحات موضوعية: Cache-timing attacks, out-of-order execution, AES, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
2دورية أكاديمية
المؤلفون: Daniel Genkin, Alex R. Jenkins, Nikki van Noord, Kalysta Makimoto, Sophie Collins, Michael K. Stickland, Wan C. Tan, Jean Bourbeau, Dennis Jensen, Miranda Kirby
المصدر: ERJ Open Research, Vol 10, Iss 1 (2024)
مصطلحات موضوعية: Medicine
وصف الملف: electronic resource
-
3دورية أكاديمية
المؤلفون: Daniel Genkin, Romain Poussier, Rui Qi Sim, Yuval Yarom, Yuanjing Zhao
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 1 (2019)
مصطلحات موضوعية: Prime Probe, Cache Attack, Side-Channel, Key-Dependent Cipher, Misaligned Tables, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
4دورية أكاديمية
المؤلفون: Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, Yuval Yarom
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 2 (2018)
مصطلحات موضوعية: SGX, Side-Channel attacks, EPID, hidden number problem, Zero-Knowledge Proofs, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
5
المؤلفون: Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Daniel Genkin, Yehuda Lindell, Ariel Nof
المصدر: Journal of Cryptology. 36
مصطلحات موضوعية: Applied Mathematics, Software, Computer Science Applications
-
6
المؤلفون: Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom
المصدر: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::93f6d4cee3ca00756ca9c58af48a42c6
https://doi.org/10.1145/3548606.3560688 -
7
المؤلفون: Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray Perlner, Arkady Yerukhimovich, Daniel Apon
المصدر: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::d79f9756ce91b1b1241b3696f213e0f9
https://doi.org/10.1145/3548606.3560673 -
8
المؤلفون: Ayush Agarwal, Sioli O'Connell, Jason Kim, Shaked Yehezkel, Daniel Genkin, Eyal Ronen, Yuval Yarom
المصدر: 2022 IEEE Symposium on Security and Privacy (SP).
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::68e4736435aa3f0dabded533e71b50e5
https://doi.org/10.1109/sp46214.2022.9833711 -
9
المؤلفون: Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin
المصدر: 2022 IEEE Symposium on Security and Privacy (SP).
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::a8b0c7f70b091a3743dcd8036e32181c
https://doi.org/10.1109/sp46214.2022.9833802 -
10
المؤلفون: Yuval Yarom, Daniel Genkin
المصدر: IEEE Security & Privacy. 19:95-98
مصطلحات موضوعية: Computer Networks and Communications, business.industry, Computer science, 020207 software engineering, 02 engineering and technology, Computer security, computer.software_genre, Software, 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, Code (cryptography), Transient (computer programming), Electrical and Electronic Engineering, Software architecture, business, Law, computer, Risk management