Login / Signup
How to Sequentialize Independent Parallel Attacks?
Sonia Bogos
Serge Vaudenay
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
parallel processing
shared memory
multiscale
parallel computing
countermeasures
parallel computation
parallel programming
parallel execution
traffic analysis
malicious attacks
attack detection
neural network