Author of the publication

Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.

, and . Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 124-142. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exact JPEG recompression., and . Visual Information Processing and Communication, volume 7543 of SPIE Proceedings, page 75430V. SPIE, (2010)Low Cost Attacks on Tamper Resistant Devices., and . Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, page 125-136. Springer, (1997)Information hiding-a survey., , and . Proc. IEEE, 87 (7): 1062-1078 (1999)Probabilistic Counting of Large Digital Signature Collections.. USENIX Security Symposium, USENIX Association, (2000)Efficient Template Attacks., and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 253-270. Springer, (2013)Electromagnetic Eavesdropping Risks of Flat-Panel Displays.. Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, page 88-107. Springer, (2004)An Asymmetric Security Mechanism for Navigation Signals.. Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 239-252. Springer, (2004)A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit Device., and . COSADE, volume 12244 of Lecture Notes in Computer Science, page 25-42. Springer, (2020)Single-Trace Fragment Template Attack on a 32-Bit Implementation of Keccak., and . CARDIS, volume 13173 of Lecture Notes in Computer Science, page 3-23. Springer, (2021)Low-threat security patches and tools., , , , and . ICSM, page 306-313. IEEE Computer Society, (1997)