<--- Back to Details
First PageDocument Content
Computer security / Cryptography / Trusted computing / Computer architecture / X86 instructions / Elliptic curve cryptography / Enhanced privacy ID / Software Guard Extensions / Digital signature / Public-key cryptography / Trusted Execution Technology / CPU cache
Date: 2018-08-09 16:06:58
Computer security
Cryptography
Trusted computing
Computer architecture
X86 instructions
Elliptic curve cryptography
Enhanced privacy ID
Software Guard Extensions
Digital signature
Public-key cryptography
Trusted Execution Technology
CPU cache

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks

Add to Reading List

Source URL: web.eecs.umich.edu

Download Document from Source Website

File Size: 641,87 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Secure communication / Financial cryptography / Cryptographic protocols / Privacy-enhancing technologies / Digital signature / Proxy server / Internet privacy / Anonymity / Enhanced privacy ID / Pseudonymity

Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

DocID: 1pXLr - View Document

Semiconductor companies / Intel / Industrial Internet Consortium / Internet of things / Gateway / Atmel / Wind River Systems / Enhanced privacy ID

Backgrounder Intel Provides a Foundation for the Internet of Things The Internet of Things (IoT) is transforming our world from disconnected, isolated systems to Internet-enabled devices that can network and communicate

DocID: 1pAzj - View Document

Cryptography / Ambient intelligence / Internet of things / Enhanced privacy ID / Gateway / Intel Security / Intel / Computer security / Machine to machine / Jasper Technologies / Sigfox

Internet of Things Security Backgrounder Confidence, Safety and Security in the Digital World The Internet of Things (IoT) has the potential to transform our world and reshape the way we interact with our environment. Mi

DocID: 1peLv - View Document

Enhanced Privacy ID from Bilinear Pairing Ernie Brickell Jiangtao Li Intel Corporation

DocID: 1n0HI - View Document

Ambient intelligence / Internet of things / Gateway / Intel / Jasper Technologies / Enhanced privacy ID

Solution brief Welcome to the Industrial IoT Revolution Intel® IoT Gateway Intel teams up with Citrix to change the way you integrate the Internet of Everything

DocID: 1kRqJ - View Document