Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation D Genkin, L Pachmanov, I Pipman, E Tromer International workshop on cryptographic hardware and embedded systems, 207-228, 2015 | 189 | 2015 |
ECDSA key extraction from mobile devices via nonintrusive physical side channels D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 178 | 2016 |
ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs D Genkin, L Pachmanov, I Pipman, E Tromer Cryptographers’ Track at the RSA Conference, 219-235, 2016 | 88 | 2016 |
Drive-by key-extraction cache attacks from portable code D Genkin, L Pachmanov, E Tromer, Y Yarom International Conference on Applied Cryptography and Network Security, 83-102, 2018 | 56 | 2018 |
Physical key extraction attacks on PCs D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer Communications of the ACM 59 (6), 70-79, 2016 | 56 | 2016 |
Techniques for securing digital signatures using multi-party computation D Yadlin, R Ben, A Navon, L Pachmanov, J Katz US Patent App. 16/524,692, 2020 | 5 | 2020 |
Techniques for securing application programming interface requests using multi-party digital signatures D Yadlin, R Ben, A Navon, L Pachmanov, J Katz US Patent App. 16/404,218, 2020 | 1 | 2020 |
Techniques for single round multi-party computation for digital signatures D Yadlin, R Ben, A Navon, L Pachmanov, J Katz US Patent App. 17/019,807, 2022 | | 2022 |
Browser Security with a Grain of Salt: Drive-by Key-Extraction Cache Attack via PNaCl D Genkin, L Pachmanov, E Tromer, Y Yarom | | 2017 |
Future Cyberdefenses Will Defeat Cyberattacks on PCs Response D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer COMMUNICATIONS OF THE ACM 59 (8), 8-8, 2016 | | 2016 |