Libgcrypt

Known as: Gcrypt 
Libgcrypt is a cryptographic library developed as a separated module of GnuPG. It can also be used independently of GnuPG, but depends on its error… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2012-2016
01220122016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
In recent years, applications increasingly adopt security primitives designed with better countermeasures against side channel… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2016
2016
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
New hardware primitives such as Intel SGX secure a user-level process in presence of an untrusted or compromised OS. Such… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
It has been six years since Ristenpart et al. [29] demonstrated the viability of co-location and provided the first concrete… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
Multi-processor systems are becoming the de-facto standard across different computing domains, ranging from high-end multi-tenant… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2015
2015
New hardware primitives such as Intel SGX have emerged which secure a user-level process in presence of an untrusted OS. Such… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2015
2015
Timing attacks can effectively recover keys from cryptosystems. While they can be defeated using constant-time implementations… (More)
  • figure 2
  • figure 4
  • figure 3
  • figure 7
  • figure 5
Is this relevant?
2014
2014
This work exposes further vulnerabilities in virtualized cloud servers by mounting Cross-VM cache attacks in Xen and VMware VMs… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2014
2014
This work exposes vulnerabilities in virtualized cloud servers by mounting Cross-VM cache attacks in Xen and VMware VMs. We show… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?