diff options
Diffstat (limited to 'refer')
| -rw-r--r-- | refer | 96 |
1 files changed, 96 insertions, 0 deletions
@@ -139,6 +139,10 @@ Accessed 3rd February 2022 %T 110th Congress (2007-2008): FISA Amendments Act of 2008 %D 2008 +%A H.R.3162 +%T 107th Congress (2001-2002): Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001 +%D 2001 + -- Intel management engine %T Intel's Management Engine is a security hazard, and users need a way to disable it @@ -360,3 +364,95 @@ Accessed 5 March 2022 %D April 2018 %A Larry Downes %J Harvard Business Review + +%T Is the Intel Management Engine a backdoor? +%A Jack Wallen +%D July 2016 +%J TechRepublic +%O https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/ +Accessed 25 March 2022 + +%T Why Windows 11 is forcing everyone to use TPM chips +%J The Verge +%A Tom Warren +%D June 2021 +%O https://www.theverge.com/2021/6/25/22550376/microsoft-windows-11-tpm-chips-requirement-security Accessed 25 March 2022 + +%T Coming to a laptop near you: A new type of security chip from Microsoft +%A Dan Goodin +%D January 2022 +%J Ars Technica +%O Accessed online 25 March 2022 +%K pluton + +%T Pixel 6: Setting a new standard for mobile security +%A Dave Kleidermacher +%A Jesse Seed +%A Brandon Barbello +%A Stephan Somogyi +%J Google Security Blog +%D October 2021 +%O https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html +Accessed 25 March 2022 + +%T Why Big Tech should embrace the ‘right to repair’ revolution +%J Financial Times +%A Dave Lee +%D August 2021 +%O Accessed online on 25 March 2022 + +%T A Notebook You Can Repair +%J New York Times Wirecutter +%A Thorin Klosowski +%D October 2021 +%O https://www.nytimes.com/wirecutter/reviews/framework-laptop/ +Accessed 25 March 2022 + +%T Post-Quantum Cryptography, Call for Proposals +%D 2017 +%J National Institute of Standards and Technology Computer Security Resource Center +%A Lily Chen +%A Dustin Moody +%A Yi-Kai Liu +%O https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/Call-for-Proposals +Accessed 25 March 2022 + +%A Alessandro Barenghi +%A G.M. Bertoni +%A Emanuele Parrinello +%A Gerardo Pelosi +%D September 2009 +%J Conference: Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009 +%T Low Voltage Fault Attacks on the RSA Cryptosystem +%O DOI: 10.1109/FDTC.2009.30 + + +%T Timing Attacks on RSA: Revealing Your Secrets through the Fourth Dimension +%D n.d. +%A Wing H. Wong +%O https://www.cs.sjsu.edu/faculty/stamp/students/article.html +Accessed 25 March 2022 + +%T Cache-Timing Attacks on RSA Key Generation +%D 2019 +%J IACR Transactions on Cryptographic Hardware and Embedded Systems +%V 2019:4 +%P 213–242 +%O DOI: 10.13154/tches.v2019.i4.213-242 +%A Alejandro Cabrera Aldaya +%A Cesar Pereida García +%A Luis Manuel Alvarez +%A Billy Bob Brumley + +%A Tim Cook +%D February 2016 +%O https://www.apple.com/customer-letter/ +Accessed 25 March 2022 + +%T Inside the FBI's encryption battle with Apple +%A Danny Yadron +%A Spencer Ackerman +%A Sam Thielman +%J The Guardian +%O Accessed online on 25 March 2022 +%D Feb 2016 |
