Hardware-Backed Heist: Extracting ECDSA Keys from Qualcomm's TrustZone.
Keegan RyanPublished in: CCS (2019)
Keyphrases
- smart card
- hardware and software
- low cost
- real time
- secret key
- massively parallel
- hardware implementation
- computer systems
- high speed
- automatically extracted
- graphics hardware
- personal computer
- control system
- computational power
- image processing
- hardware architecture
- computing platform
- software implementation
- computing power
- computing systems
- embedded systems
- data acquisition
- databases