Skip to search formSkip to main contentSkip to account menu

GNU Privacy Guard

Known as: MacGPG, GnuPG, GnuPG made easy 
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite. GnuPG is compliant with , which is… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These… 
Highly Cited
2016
Highly Cited
2016
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to induce bit flips over arbitrary physical… 
Highly Cited
2016
Highly Cited
2016
In a carbon-constrained world, the continuing and rapid growth of gas-fired power generation (GPG) will lead to the increasing… 
Highly Cited
2015
Highly Cited
2015
We present an effective implementation of the Prime+Probe side-channel attack against the last-level cache. We measure the… 
Highly Cited
2014
Highly Cited
2014
Sharing memory pages between non-trusting processes is a common method of reducing the memory footprint of multi-tenanted systems… 
Highly Cited
2014
Highly Cited
2014
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These… 
Review
2014
Review
2014
 The KP Supplement has 2 chapters and an Overview Chapter. It broadly maintains the structure and general content of Chapter 4… 
Highly Cited
2006
Highly Cited
2006
In many content distribution systems it is important both to restrict access to content to authorized users and to protect the… 
Highly Cited
2005
Highly Cited
2005
In dynamic environments, agents have to deal with changing situations. In these cases, repairing a plan is often more efficient…