Timing attacks on PIN input devicesJan 1, 2010ยทDenis Foo Kune,Yongdae Kimยท 0 min read DOILast updated on Jan 1, 2010 AuthorsDenis Foo KuneAuthorsYongdae Kim← Secure encounter-based social networks: requirements, challenges, and designs Jan 1, 2010Hashing it out in public: common failure modes of DHT-based anonymity schemes Jan 1, 2009 →