Login / Signup
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis.
Ben Lapid
Avishai Wool
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
efficient implementation
neural network
data analysis
static analysis
advanced encryption standard
statistical analysis
parallel processing
countermeasures