Itamar Pipman
TitleCited byYear
Making ethical decisions
J Kreie, TP Cronan
Communications of the ACM 43 (12), 66-66, 2000
166*2000
Get your hands off my laptop: Physical side-channel key-extraction attacks on PCs
D Genkin, I Pipman, E Tromer
Journal of Cryptographic Engineering 5 (2), 95-112, 2015
1242015
Stealing keys from PCs using a radio: Cheap electromagnetic attacks on windowed exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
International workshop on cryptographic hardware and embedded systems, 207-228, 2015
1142015
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
982016
ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs
D Genkin, L Pachmanov, I Pipman, E Tromer
Cryptographers’ Track at the RSA Conference, 219-235, 2016
502016
Physical key extraction attacks on PCs
D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer
Communications of the ACM 59 (6), 70-79, 2016
362016
Future Cyberdefenses Will Defeat Cyberattacks on PCs Response
D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer
COMMUNICATIONS OF THE ACM 59 (8), 8-8, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–7