Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,150,981 papers from all fields of science
Search
Sign In
Create Free Account
GNU Privacy Guard
Known as:
MacGPG
, GnuPG
, GnuPG made easy
Expand
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite. GnuPG is compliant with , which is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Add-ons for Firefox
Android
Android Privacy Guard
Application programming interface
Expand
Broader (1)
Privacy software
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Acoustic Cryptanalysis
Daniel Genkin
,
A. Shamir
,
Eran Tromer
Journal of Cryptology
2017
Corpus ID: 31377774
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These…
Expand
Highly Cited
2016
Highly Cited
2016
Flip Feng Shui: Hammering a Needle in the Software Stack
Kaveh Razavi
,
Ben Gras
,
Erik Bosman
,
B. Preneel
,
Cristiano Giuffrida
,
H. Bos
USENIX Security Symposium
2016
Corpus ID: 1677437
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to induce bit flips over arbitrary physical…
Expand
Highly Cited
2016
Highly Cited
2016
A Linear Programming Approach to Expansion Co-Planning in Gas and Electricity Markets
J. Qiu
,
Hongming Yang
,
+4 authors
K. Wong
IEEE Transactions on Power Systems
2016
Corpus ID: 2565976
In a carbon-constrained world, the continuing and rapid growth of gas-fired power generation (GPG) will lead to the increasing…
Expand
Highly Cited
2015
Highly Cited
2015
Last-Level Cache Side-Channel Attacks are Practical
Fangfei Liu
,
Y. Yarom
,
Qian Ge
,
G. Heiser
,
R. Lee
IEEE Symposium on Security and Privacy
2015
Corpus ID: 2741260
We present an effective implementation of the Prime+Probe side-channel attack against the last-level cache. We measure the…
Expand
Highly Cited
2014
Highly Cited
2014
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
Y. Yarom
,
K. Falkner
USENIX Security Symposium
2014
Corpus ID: 5171267
Sharing memory pages between non-trusting processes is a common method of reducing the memory footprint of multi-tenanted systems…
Expand
Highly Cited
2014
Highly Cited
2014
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Daniel Genkin
,
A. Shamir
,
Eran Tromer
Annual International Cryptology Conference
2014
Corpus ID: 15657777
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These…
Expand
Review
2014
Review
2014
Afforestation, Reforestation, Deforestation: IPCC 2013 Revised Supplementary Methods and Good Practice Guidance Arising from the Kyoto Protocol (KP Supplement)
G. Grassi
,
N. Ravindranath
,
+12 authors
Guangsheng Zhou
2014
Corpus ID: 133207933
The KP Supplement has 2 chapters and an Overview Chapter. It broadly maintains the structure and general content of Chapter 4…
Expand
Highly Cited
2007
Highly Cited
2007
Biomass estimation over a large area based on standwise forest inventory data and ASTER and MODIS satellite data: A possibility to verify carbon inventories
P. Muukkonen
,
J. Heiskanen
2007
Corpus ID: 356255
Highly Cited
2006
Highly Cited
2006
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
A. Barth
,
D. Boneh
,
Brent Waters
Financial Cryptography
2006
Corpus ID: 6914510
In many content distribution systems it is important both to restrict access to content to authorized users and to protect the…
Expand
Highly Cited
2005
Highly Cited
2005
Plan Repair as an Extension of Planning
Roman van der Krogt
,
M. D. Weerdt
International Conference on Automated Planning…
2005
Corpus ID: 14400956
In dynamic environments, agents have to deal with changing situations. In these cases, repairing a plan is often more efficient…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE