GNU Privacy Guard

Known as: MacGPG, GnuPG, GnuPG made easy 
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite. GnuPG is compliant with , which is… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to induce bit flips over arbitrary physical… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2015
Highly Cited
2015
We present an effective implementation of the Prime+Probe side-channel attack against the last-level cache. We measure the… (More)
  • figure 1
  • figure 3
  • figure 2
  • table I
  • figure 4
Is this relevant?
2015
2015
We present new side-channel attacks on RSA and ElGamal implementations that use the popular sliding-window or fixed-window (m-ary… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
According to the IPCC GPG (Intergovernmental Panel on Climate Change, Good Practice Guidance), remote sensing methods are… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In many content distribution systems it is important both to restrict access to content to authorized users and to protect the… (More)
  • figure 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
A growing field of literature is studying how usability impacts security [4]. One class of security software is anonymizing… (More)
Is this relevant?
2006
2006
This paper outlines a Distributed Denial of Service (DDoS) attack which abuses open recursive Domain Name System (DNS) name… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In dynamic environments, agents have to deal with changing situations. In these cases, repairing a plan is often more efficient… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2004
2004
More and more software use cryptography. But how can one know if what is implemented is good cryptography? For proprietary… (More)
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
1999
1999
 
Is this relevant?