First Page | Document Content | |
---|---|---|
Date: 2016-06-09 06:04:52 | Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These includeAdd to Reading ListSource URL: www.cryptolux.orgDownload Document from Source WebsiteFile Size: 289,27 KBShare Document on Facebook |