From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Spectre Attacks: Exploiting Speculative Execution., , , , , , , , , и . CoRR, (2018)Spectre attacks: exploiting speculative execution., , , , , , , , , и 2 other автор(ы). Commun. ACM, 63 (7): 93-101 (2020)Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow., , , , , , , , , и . IEEE Micro, 39 (3): 66-74 (2019)RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis., , и . CRYPTO (1), том 8616 из Lecture Notes in Computer Science, стр. 444-461. Springer, (2014)Fallout: Reading Kernel Writes From User Space., , , , , , , , , и . CoRR, (2019)Fast Large-Scale Honest-Majority MPC for Malicious Adversaries., , , , , , и . J. Cryptol., 36 (3): 15 (июля 2023)Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries., , и . ICPC, стр. 292-303. IEEE, (2023)Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms., , , , , , , и . EuroS&P, стр. 507-522. IEEE, (2021)CacheBleed: a timing attack on OpenSSL constant-time RSA., , и . J. Cryptographic Engineering, 7 (2): 99-112 (2017)Best of Both Worlds in Secure Computation, with Low Communication Overhead., , и . ACNS, том 10892 из Lecture Notes in Computer Science, стр. 340-359. Springer, (2018)