1 |
Won, Yoo-Seung, et al. "Practical Cold boot attack on IoT device-Case study on Raspberry Pi." 2020 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA). IEEE, 2020.
|
2 |
Kamal, Abdel Alim, and Amr M. Youssef. "Applications of SAT solvers to AES key recov- ery from decayed key schedule images." 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies. IEEE, 2010.
|
3 |
Paterson, Kenneth G., Antigoni Polychroniadou, and Dale L. Sibborn. "A coding-theoretic ap- proach to recovering noisy RSA keys." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2012.
|
4 |
Paterson, Kenneth G., and Ricardo Villanueva-Polanco. "Cold boot attacks on NTRU." International Conference on Cryptology in India. Springer, Cham, 2017.
|
5 |
Albrecht, Martin R., Amit Deo, and Kenneth G. Paterson. "Cold boot attacks on ring and module lwe keys under the ntt." IACR Transactions on Cryptographic Hardware and Embedded Systems (2018): 173-213.
|
6 |
Villanueva-Polanco, Ricardo. "Cold Boot Attacks on LUOV." Applied Sciences 10.12 (2020): 4106.
DOI
|
7 |
Villanueva-Polanco, Ricardo. "Cold Boot Attacks on Bliss." International Conference on Cryptology and Information Security in Latin America. Springer, Cham, 2019.
|
8 |
Polanco, Ricardo Villanueva. Cold Boot Attacks on Post-Quantum Schemes. Diss. Royal Holloway, University of London, 2019.
|
9 |
Villanueva-Polanco, Ricardo, and Eduardo Angulo-Madrid. "Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism." Applied Sciences 11.1 (2021): 193.
DOI
|
10 |
Muller, Tilo, Felix C. Freiling, and Andreas Dewald. "TRESOR Runs Encryption Securely Outside RAM." USENIX Security Symposium. Vol. 17. 2011.
|
11 |
Gotzfried, Johannes, and Tilo Muller. "ARMORED: CPU-bound encryption for Android-driven ARM devices." 2013 International Conference on Availability, Reliability and Security. IEEE, 2013.
|
12 |
Halderman, J. Alex, et al. "Lest we remember: cold-boot attacks on encryption keys." Communications of the ACM 52.5 (2009): 91-98.
DOI
|
13 |
Tilo, Muller, Spreitzenbarth Michael, and Felix C. Freiling. "Frost: forensic recovery of scrambled telephones." Proceedings of the International Conference on Applied Cryptography and Network Security. 2014.
|
14 |
Bauer, Johannes, Michael Gruhn, and Felix C. Freiling. "Lest we forget: Cold-boot attacks on scrambled DDR3 memory." Digital Investigation 16 (2016): S65-S74.
DOI
|
15 |
Yitbarek, Salessawi Ferede, et al. "Cold boot attacks are still hot: Security analysis of memory scramblers in modern processors." 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 2017.
|