Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Hamburg, Mike"'
Generalized Reed-Solomon (RS) codes are a common choice for efficient, reliable error correction in memory and communications systems. These codes add $2t$ extra parity symbols to a block of memory, and can efficiently and reliably correct up to $t$
Externí odkaz:
http://arxiv.org/abs/2401.10688
Autor:
Woo, Steven C., Elsasser, Wendy, Hamburg, Mike, Linstadt, Eric, Miller, Michael R., Song, Taeksang, Tringali, James
RowHammer attacks are a growing security and reliability concern for DRAMs and computer systems as they can induce many bit errors that overwhelm error detection and correction capabilities. System-level solutions are needed as process technology and
Externí odkaz:
http://arxiv.org/abs/2310.16354
Autor:
Kocher, Paul, Genkin, Daniel, Gruss, Daniel, Haas, Werner, Hamburg, Mike, Lipp, Moritz, Mangard, Stefan, Prescher, Thomas, Schwarz, Michael, Yarom, Yuval
Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try guess the destination and attempt to
Externí odkaz:
http://arxiv.org/abs/1801.01203
Autor:
Lipp, Moritz, Schwarz, Michael, Gruss, Daniel, Prescher, Thomas, Haas, Werner, Mangard, Stefan, Kocher, Paul, Genkin, Daniel, Yarom, Yuval, Hamburg, Mike
The security of computer systems fundamentally relies on memory isolation, e.g., kernel address ranges are marked as non-accessible and are protected from user access. In this paper, we present Meltdown. Meltdown exploits side effects of out-of-order
Externí odkaz:
http://arxiv.org/abs/1801.01207
Autor:
Kocher, Paul, Horn, Jann, Fogh, Anders, Genkin, Daniel, Gruss, Daniel, Haas, Werner, Hamburg, Mike, Lipp, Moritz, Mangard, Stefan, Prescher, Thomas, Schwarz, Michael, Yarom, Yuval
Publikováno v:
Communications of the ACM; Jul2020, Vol. 63 Issue 7, p93-101, 9p, 1 Black and White Photograph, 3 Diagrams
Autor:
LIPP, MORITZ, SCHWARZ, MICHAEL, GRUSS, DANIEL, PRESCHER, THOMAS, HAAS, WERNER, HORN, JANN, MANGARD, STEFAN, KOCHER, PAUL, GENKIN, DANIEL, YAROM, YUVAL, HAMBURG, MIKE, STRACKX, RAOUL
Publikováno v:
Communications of the ACM; Jun2020, Vol. 63 Issue 6, p46-56, 11p, 1 Color Photograph, 2 Diagrams, 2 Charts, 2 Graphs
Autor:
Bindel, Nina, Hamburg, Mike, Hövelmanns, Kathrin, Hülsing, Andreas, Persichetti, Edoardo, Hofheinz, Dennis, Rosen, Alon
Publikováno v:
Theory of Cryptography ISBN: 9783030360320
TCC (2)
Theory of Cryptography TCC 2019
Theory of Cryptography-17th International Conference, TCC 2019, Proceedings, 2, 61-90
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Theory of Cryptography
TCC (2)
Theory of Cryptography TCC 2019
Theory of Cryptography-17th International Conference, TCC 2019, Proceedings, 2, 61-90
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Theory of Cryptography
We revisit the construction of IND-CCA secure key encapsulation mechanisms (KEM) from public-key encryption schemes (PKE). We give new, tighter security reductions for several constructions. Our main result is an improved reduction for the security o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::57f79dfe6774a77c445ac67952334a0a
https://doi.org/10.1007/978-3-030-36033-7_3
https://doi.org/10.1007/978-3-030-36033-7_3
Autor:
Hamburg, Mike
Publikováno v:
Advances in Cryptology, Crypto 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I; 2015, p705-723, 19p
Autor:
Hamburg, Mike
Publikováno v:
Cryptographic Hardware & Embedded Systems - CHES 2009; 2009, p18-32, 15p
Publikováno v:
Advances in Cryptology - CRYPTO 2008; 2008, p108-125, 18p