<--- Back to Details
First PageDocument Content
Computer security / Cryptography / Trusted computing / Computer architecture / X86 instructions / Elliptic curve cryptography / Enhanced privacy ID / Software Guard Extensions / Digital signature / Public-key cryptography / Trusted Execution Technology / CPU cache
Date: 2018-08-09 16:06:58
Computer security
Cryptography
Trusted computing
Computer architecture
X86 instructions
Elliptic curve cryptography
Enhanced privacy ID
Software Guard Extensions
Digital signature
Public-key cryptography
Trusted Execution Technology
CPU cache

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks

Add to Reading List

Source URL: web.eecs.umich.edu

Download Document from Source Website

File Size: 641,87 KB

Share Document on Facebook

Similar Documents

Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

DocID: 1pXLr - View Document

Backgrounder Intel Provides a Foundation for the Internet of Things The Internet of Things (IoT) is transforming our world from disconnected, isolated systems to Internet-enabled devices that can network and communicate

Backgrounder Intel Provides a Foundation for the Internet of Things The Internet of Things (IoT) is transforming our world from disconnected, isolated systems to Internet-enabled devices that can network and communicate

DocID: 1pAzj - View Document

Internet of Things Security Backgrounder Confidence, Safety and Security in the Digital World The Internet of Things (IoT) has the potential to transform our world and reshape the way we interact with our environment. Mi

Internet of Things Security Backgrounder Confidence, Safety and Security in the Digital World The Internet of Things (IoT) has the potential to transform our world and reshape the way we interact with our environment. Mi

DocID: 1peLv - View Document

Enhanced Privacy ID from Bilinear Pairing Ernie Brickell Jiangtao Li  Intel Corporation

Enhanced Privacy ID from Bilinear Pairing Ernie Brickell Jiangtao Li Intel Corporation

DocID: 1n0HI - View Document

Solution brief  Welcome to the Industrial IoT Revolution Intel® IoT Gateway Intel teams up with Citrix to change the way you integrate the Internet of Everything

Solution brief Welcome to the Industrial IoT Revolution Intel® IoT Gateway Intel teams up with Citrix to change the way you integrate the Internet of Everything

DocID: 1kRqJ - View Document