Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

GNU Privacy Guard

Known as: MacGPG, GnuPG, GnuPG made easy 
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite. GnuPG is compliant with , which is… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to induce bit flips over arbitrary physical… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2015
Highly Cited
2015
We present an effective implementation of the Prime+Probe side-channel attack against the last-level cache. We measure the… Expand
  • figure 1
  • figure 3
  • figure 2
  • table I
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Sharing memory pages between non-trusting processes is a common method of reducing the memory footprint of multi-tenanted systems… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Abstract According to the IPCC GPG (Intergovernmental Panel on Climate Change, Good Practice Guidance), remote sensing methods… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In many content distribution systems it is important both to restrict access to content to authorized users and to protect the… Expand
  • figure 1
Is this relevant?
2006
2006
It is shown that a smooth metal film (or a plasma layer) can be made transparent for an electromagnetic wave when two identical… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In dynamic environments, agents have to deal with changing situations. In these cases, repairing a plan is often more efficient… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
More and more software use cryptography. But how can one know if what is implemented is good cryptography? For proprietary… Expand
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
1999
1999
 
Is this relevant?