共 50 条
- [41] Protecting Cryptographic Keys against Continual Leakage ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 41 - 58
- [42] K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 412 - 425
- [43] Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 268 - 280
- [44] A new method for generating keys ICSP '96 - 1996 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PROCEEDINGS, VOLS I AND II, 1996, : 1570 - 1573
- [45] Generating Secret Keys from Biometric Body Impedance Measurements PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16), 2016, : 59 - 69
- [46] NOCRY: No More Secure Encryption Keys for Cryptographic Ransomware EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2019, 2020, 11967 : 69 - 85
- [47] MoCrySIL - Carry Your Cryptographic Keys in Your Pocket 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 285 - 292
- [49] Biometric/Cryptographic Keys Binding based on Function Minimization 2016 12TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2016, : 144 - 150