Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

GNU Privacy Guard

Known as: MacGPG, GnuPG, GnuPG made easy 
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite. GnuPG is compliant with , which is… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to induce bit flips over arbitrary physical… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2016
Highly Cited
2016
In a carbon-constrained world, the continuing and rapid growth of gas-fired power generation (GPG) will lead to the increasing… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2016
2016
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2015
Highly Cited
2015
We present an effective implementation of the Prime+Probe side-channel attack against the last-level cache. We measure the… 
  • figure 1
  • figure 3
  • figure 2
  • table I
  • figure 4
Highly Cited
2015
Highly Cited
2015
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2014
Highly Cited
2014
Sharing memory pages between non-trusting processes is a common method of reducing the memory footprint of multi-tenanted systems… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2013
Highly Cited
2013
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2007
Highly Cited
2007
Abstract According to the IPCC GPG (Intergovernmental Panel on Climate Change, Good Practice Guidance), remote sensing methods… 
  • figure 1
  • table 1
  • figure 2
  • figure 4
  • figure 3
Highly Cited
2006
Highly Cited
2006
In many content distribution systems it is important both to restrict access to content to authorized users and to protect the… 
  • figure 1
Highly Cited
2005
Highly Cited
2005
In dynamic environments, agents have to deal with changing situations. In these cases, repairing a plan is often more efficient… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5