Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Libgcrypt

Known as: Gcrypt (cryptographic library) 
Libgcrypt is a cryptographic library developed as a separated module of GnuPG. It can also be used independently of GnuPG, but depends on its error… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
The adversarial model presented by trusted execution environments (TEEs) has prompted researchers to investigate unusual attack… Expand
Is this relevant?
Highly Cited
2017
Highly Cited
2017
Protected module architectures, such as Intel SGX, enable strong trusted computing guarantees for hardware-enforced enclaves on… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
In recent years, applications increasingly adopt security primitives designed with better countermeasures against side channel… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2017
2017
The trend of supporting wide vector units in general purpose microprocessors suggests opportunities for developing a new and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2016
Highly Cited
2016
New hardware primitives such as Intel SGX secure a user-level process in presence of an untrusted or compromised OS. Such… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2016
Highly Cited
2016
Multi-processor systems are becoming the de-facto standard across different computing domains, ranging from high-end multi-tenant… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2015
Highly Cited
2015
We demonstrate physical side-channel attacks on a popular software implementation of RSA and ElGamal, running on laptop computers… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2015
Highly Cited
2015
It has been six years since Ristenpart et al. [29] demonstrated the viability of co-location and provided the first concrete… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
This work exposes vulnerabilities in virtualized cloud servers by mounting Cross-VM cache attacks in Xen and VMware VMs. We show… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?