Hacker News
- Show HN: Academic personal page in pure HTML and CSS https://www.cs.tau.ac.il/~nurlan/ 2 comments
- Detecting Screen Content via Remote Acoustic Side Channels https://www.cs.tau.ac.il/~tromer/synesthesia/ 24 comments
- DeepChess: End-To-End Deep Neural Network for Automatic Learning in Chess [pdf] http://www.cs.tau.ac.il/~wolf/papers/deepchess.pdf 11 comments
- ECDSA smartphone key extraction using $2 magnetic probe https://www.cs.tau.ac.il/~tromer/mobilesc/ 41 comments
- Physical Side-Channel Key-Extraction Attacks On PCs http://www.cs.tau.ac.il/~tromer/handsoff/ 16 comments
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis http://www.cs.tau.ac.il/~tromer/acoustic/ 95 comments
- Concurrent Data Structures http://www.cs.tau.ac.il/~shanir/concurrent-data-structures.pdf 6 comments
- "Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels" by Daniel Genkin, Mihir Pattani, Roei Schuster, and Eran Tromer [PDF] https://www.cs.tau.ac.il/~tromer/synesthesia/synesthesia.pdf 4 comments programming
- Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels https://www.cs.tau.ac.il/~tromer/synesthesia/ 20 comments netsec
- Scientists hack a computer using just the sound of the CPU. Researchers extract 4096-bit RSA decryption keys from laptop computers in under an hour using a mobile phone placed next to the computer. http://www.cs.tau.ac.il/~tromer/acoustic/ 6 comments science
- Scientists hack a computer using just the sound of the CPU. Researchers extract 4096-bit RSA decryption keys from laptop computers in under an hour using a mobile phone placed next to the computer. http://www.cs.tau.ac.il/~tromer/acoustic/ 10 comments science
- ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs https://www.cs.tau.ac.il/~tromer/ecdh/ 21 comments netsec
- ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs https://www.cs.tau.ac.il/~tromer/ecdh/ 4 comments crypto
- Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks On PCs http://www.cs.tau.ac.il/~tromer/handsoff/ 8 comments netsec
- Physical Side-Channel Key-Extraction Attacks On PCs http://www.cs.tau.ac.il/~tromer/handsoff/ 3 comments crypto
- Researchers extract 4096-bit RSA decryption keys from laptop computers in under an hour using a mobile phone placed next to the computer http://www.cs.tau.ac.il/~tromer/acoustic/ 6 comments sysadmin
- Scientists hack a computer using just the sound of the CPU. Researchers extract 4096-bit RSA decryption keys from laptop computers in under an hour using a mobile phone placed next to the computer. (Science X-post) http://www.cs.tau.ac.il/~tromer/acoustic/ 17 comments technology
- Scientists hack a computer using just the sound of the CPU. Researchers extract 4096-bit RSA decryption keys from laptop computers in under an hour using a mobile phone placed next to the computer. http://www.cs.tau.ac.il/~tromer/acoustic/ 1560 comments science
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis http://www.cs.tau.ac.il/~tromer/acoustic/ 10 comments programming
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis https://www.cs.tau.ac.il/~tromer/acoustic/ 35 comments netsec
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis http://www.cs.tau.ac.il/~tromer/acoustic/ 17 comments crypto
- How far of the edge of the table can we reach by stacking n identical blocks of length 1? [powerpoint presentation] http://www.cs.tau.ac.il/%7Ezwick/slides/overhang.pps 10 comments math
- The Art of Multiprocessor Programming - Slides and Tutorials http://www.cs.tau.ac.il/~multi/?p=slides 9 comments programming
- Data-Driven Enhancement of Facial Attractiveness http://www.cs.tau.ac.il/~tommer/beautification2008/ 4 comments science
- Data-Driven Enhancement of Facial Attractiveness http://www.cs.tau.ac.il/~tommer/beautification2008/ 10 comments programming
- Software Horror Stories: Bugs with consequence http://www.cs.tau.ac.il/~nachumd/horror.html 2 comments programming