From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Meltdown., , , , , , , , , и . CoRR, (2018)"Make Sure DSA Signing Exponentiations Really are Constant-Time"., , и . ACM Conference on Computer and Communications Security, стр. 1639-1650. ACM, (2016)CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives., , , , , , , , , и 2 other автор(ы). Proc. ACM Program. Lang., 7 (PLDI): 1268-1292 (2023)SoK: Design Tools for Side-Channel-Aware Implementions., , , и . CoRR, (2021)BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from NVIDIA GPUs., , , , и . CoRR, (2023)CacheFX: A Framework for Evaluating Cache Security., , , , , и . CoRR, (2022)PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses., , , , , и . CoRR, (2020)Whack-a-Meltdown: Microarchitectural Security Games Systems Attacks and Defenses., и . IEEE Secur. Priv., 19 (1): 95-98 (2021)iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices., , , и . CCS, стр. 2038-2052. ACM, (2023)Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung., , , и . Comput. J., 66 (6): 1335-1341 (июня 2023)