Login / Signup
Securing Branch Predictors with Two-Level Encryption.
Jaekyu Lee
Yasuo Ishii
Dam Sunwoo
Published in:
ACM Trans. Archit. Code Optim. (2020)
Keyphrases
</>
query performance prediction
encryption algorithms
information security
secret key
encryption scheme
key management
real time
digital signature
ciphertext
data encryption standard
smart card
security analysis
image encryption
identity authentication
chaotic sequence
multimedia streaming