<--- Back to Details
First PageDocument Content
Computer security / Cryptography / Trusted computing / Computer architecture / X86 instructions / Elliptic curve cryptography / Enhanced privacy ID / Software Guard Extensions / Digital signature / Public-key cryptography / Trusted Execution Technology / CPU cache
Date: 2018-08-09 16:06:58
Computer security
Cryptography
Trusted computing
Computer architecture
X86 instructions
Elliptic curve cryptography
Enhanced privacy ID
Software Guard Extensions
Digital signature
Public-key cryptography
Trusted Execution Technology
CPU cache

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks

Add to Reading List

Source URL: web.eecs.umich.edu

Download Document from Source Website

File Size: 641,87 KB

Share Document on Facebook

Similar Documents

Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1

DocID: 1sIIK - View Document

Computing / Concurrent computing / Cloud infrastructure / Parallel computing / Distributed computing architecture / Apache Software Foundation / MapReduce / Apache Hadoop / Data / Software Guard Extensions / Cloud computing

2015 IEEE Symposium on Security and Privacy VC3: Trustworthy Data Analytics in the Cloud using SGX Felix Schuster∗ , Manuel Costa, C´edric Fournet, Christos Gkantsidis Marcus Peinado, Gloria Mainar-Ruiz, Mark Russino

DocID: 1qb92 - View Document

Secure multi-party computation / Software Guard Extensions / Cryptography / Singapore Exchange / Secure two-party computation / Eval / Communications protocol / Cryptographic protocol

Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1

DocID: 1oGpf - View Document

Computer hardware / Instruction set architectures / Economy of Singapore / Singapore Exchange / X86-64 / Intel / X87 / ARM architecture / Computer architecture / X86 architecture / Computing

Intel® Software Guard Extensions Programming Reference[removed]002US OCTOBER 2014

DocID: PeYN - View Document