First Page | Document Content | |
---|---|---|
Date: 2018-08-09 16:06:58Computer security Cryptography Trusted computing Computer architecture X86 instructions Elliptic curve cryptography Enhanced privacy ID Software Guard Extensions Digital signature Public-key cryptography Trusted Execution Technology CPU cache | CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache AttacksAdd to Reading ListSource URL: web.eecs.umich.eduDownload Document from Source WebsiteFile Size: 641,87 KBShare Document on Facebook |