<--- Back to Details
First PageDocument Content
Computer security / Cryptography / Trusted computing / Computer architecture / X86 instructions / Elliptic curve cryptography / Enhanced privacy ID / Software Guard Extensions / Digital signature / Public-key cryptography / Trusted Execution Technology / CPU cache
Date: 2018-08-09 16:06:58
Computer security
Cryptography
Trusted computing
Computer architecture
X86 instructions
Elliptic curve cryptography
Enhanced privacy ID
Software Guard Extensions
Digital signature
Public-key cryptography
Trusted Execution Technology
CPU cache

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks

Add to Reading List

Source URL: web.eecs.umich.edu

Download Document from Source Website

File Size: 641,87 KB

Share Document on Facebook

Similar Documents

IEEE COMPUTER ARCHITECTURE LETTERS, VOL. 11, NO. 2, JULY-DECEMBERIncluding Variability in Large-Scale Cluster Power Models

IEEE COMPUTER ARCHITECTURE LETTERS, VOL. 11, NO. 2, JULY-DECEMBERIncluding Variability in Large-Scale Cluster Power Models

DocID: 1xUHZ - View Document

Calibrating the Classifier: Siamese Neural Network Architecture for End-to-End Arousal Recognition from ECG Andrea Patan`e and Marta Kwiatkowska Department of Computer Science, University of Oxford

Calibrating the Classifier: Siamese Neural Network Architecture for End-to-End Arousal Recognition from ECG Andrea Patan`e and Marta Kwiatkowska Department of Computer Science, University of Oxford

DocID: 1xTaw - View Document

CALL FOR WORKSHOPS AND TUTORIAL PROPOSALS HPCA 2018 24th IEEE International Symposium on HighPerformance Computer Architecture GENERAL CHAIR Michael Gschwind, IBM TJ Watson

CALL FOR WORKSHOPS AND TUTORIAL PROPOSALS HPCA 2018 24th IEEE International Symposium on HighPerformance Computer Architecture GENERAL CHAIR Michael Gschwind, IBM TJ Watson

DocID: 1vpZy - View Document

Call for Papers 2014 Annual Conference of Advanced Computer Architecture (Shenyang, China) (http://aca2014.tcarch.org) In order to promote the development of information technology and strengthen academic exchanges, the

Call for Papers 2014 Annual Conference of Advanced Computer Architecture (Shenyang, China) (http://aca2014.tcarch.org) In order to promote the development of information technology and strengthen academic exchanges, the

DocID: 1vpbt - View Document

Siamese Network: Architecture and Applications in Computer Vision Tech Report Dec 30, 2014 Hengliang Luo

Siamese Network: Architecture and Applications in Computer Vision Tech Report Dec 30, 2014 Hengliang Luo

DocID: 1vp5V - View Document