Skip to search formSkip to main contentSkip to account menu

Cold boot attack

Known as: Full memory encryption, Iceman attack, Platform reset attack 
In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
We study the formation of galaxies in a large volume (50h Mpc, 2 × 288 particles) cosmological simulation, evolved using the… 
2015
2015
Context. Dust is a good tracer of cold dark clouds but its column density is di cult to quantify. Aims. We want to check whether… 
2015
2015
Encryption of data residing on the permanent memory of a device, also known as On-Device Encryption (ODE), is a well studied… 
2014
2014
— DRAM is an important memory of a computer. Microprocessor loads the data requested by the user into DRAM before processing the… 
Review
2012
Review
2012
We study a large sample of narrow-line radio galaxies (NLRGs) with extended radio structures. Using 1.4 GHz radio luminosities L1… 
2009
2009
Use open-source tools to dump and scan RAM from a target system for encyption keys and other goodies. 
2009
2009
: Buruli ulcer is still a public health problem in Cote d'Ivoire. Its physiopathology is poorly described and suggests a new… 
2004
2004
Cold and ultracold collisions involving rotationally hot oxygen molecules are investigated using quantum-mechanical, coupled… 
Review
2001
Review
2001
We measure the autocorrelation function, ξ, of galaxies in the IRAS Point Source Catalogue galaxy redshift (PSCz) survey and…