Lev Pachmanov
TitleCited byYear
Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
International workshop on cryptographic hardware and embedded systems, 207-228, 2015
1142015
Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
International workshop on cryptographic hardware and embedded systems, 207-228, 2015
1142015
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
982016
ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs
D Genkin, L Pachmanov, I Pipman, E Tromer
Cryptographers’ Track at the RSA Conference, 219-235, 2016
502016
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
PJ Denning
Communications of the ACM 60 (12), 20-23, 2017
39*2017
Physical key extraction attacks on PCs
D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer
Communications of the ACM 59 (6), 70-79, 2016
362016
Drive-by key-extraction cache attacks from portable code
D Genkin, L Pachmanov, E Tromer, Y Yarom
International Conference on Applied Cryptography and Network Security, 83-102, 2018
182018
Browser Security with a Grain of Salt: Drive-by Key-Extraction Cache Attack via PNaCl
D Genkin, L Pachmanov, E Tromer, Y Yarom
2017
Future Cyberdefenses Will Defeat Cyberattacks on PCs Response
D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer
COMMUNICATIONS OF THE ACM 59 (8), 8-8, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–9