default search action
Paul C. Kocher
Person information
- affiliation: Cryptography Research, Inc.
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j7]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. Commun. ACM 63(6): 46-56 (2020) - [j6]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre attacks: exploiting speculative execution. Commun. ACM 63(7): 93-101 (2020) - 2016
- [j5]Paul Kocher:
Computer security is broken: can better hardware help fix it? Commun. ACM 59(8): 22-25 (2016) - 2011
- [j4]Paul C. Kocher, Joshua Jaffe, Benjamin Jun, Pankaj Rohatgi:
Introduction to differential power analysis. J. Cryptogr. Eng. 1(1): 5-27 (2011) - 2004
- [j3]Paul C. Kocher, Bruce Schneier:
Insider risks in elections. Commun. ACM 47(7): 104 (2004) - [j2]Srivaths Ravi, Anand Raghunathan, Paul C. Kocher, Sunil Hattangady:
Security in embedded systems: Design challenges. ACM Trans. Embed. Comput. Syst. 3(3): 461-491 (2004) - [j1]Jean-Sébastien Coron, David Naccache, Paul C. Kocher:
Statistics and secret leakage. ACM Trans. Embed. Comput. Syst. 3(3): 492-508 (2004)
Conference and Workshop Papers
- 2019
- [c9]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. IEEE Symposium on Security and Privacy 2019: 1-19 - 2018
- [c8]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown: Reading Kernel Memory from User Space. USENIX Security Symposium 2018: 973-990 - 2011
- [c7]Paul Kocher:
Complexity and the challenges of securing SoCs. DAC 2011: 328-331 - 2004
- [c6]Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan:
Security as a new dimension in embedded system design. DAC 2004: 753-760 - 2000
- [c5]Jean-Sébastien Coron, Paul C. Kocher, David Naccache:
Statistics and Secret Leakage. Financial Cryptography 2000: 157-173 - 1999
- [c4]Paul C. Kocher, Joshua Jaffe, Benjamin Jun:
Differential Power Analysis. CRYPTO 1999: 388-397 - 1998
- [c3]Paul C. Kocher:
On Certificate Revocation and Validation. Financial Cryptography 1998: 172-177 - 1996
- [c2]Paul C. Kocher:
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. CRYPTO 1996: 104-113 - 1994
- [c1]Eli Biham, Paul C. Kocher:
A Known Plaintext Attack on the PKZIP Stream Cipher. FSE 1994: 144-153
Parts in Books or Collections
- 2022
- [p1]Paul Kocher:
Public Key Cryptography in Computer and Network Security. Democratizing Cryptography 2022: 57-76
Informal and Other Publications
- 2018
- [i5]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. CoRR abs/1801.01203 (2018) - [i4]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. CoRR abs/1801.01207 (2018) - [i3]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. meltdownattack.com (2018) - [i2]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. meltdownattack.com (2018) - 2011
- [i1]Alan O. Freier, Philip Karlton, Paul C. Kocher:
The Secure Sockets Layer (SSL) Protocol Version 3.0. RFC 6101: 1-67 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint