Security Analysis of the Silver Bullet Technique for RowHammer Prevention.
Abdullah Giray YaglikçiJeremie S. KimFabrice DevauxOnur MutluPublished in: CoRR (2021)
Keyphrases
- security analysis
- smart card
- security requirements
- high security
- public key
- security model
- security properties
- image encryption
- mutual authentication
- encryption algorithm
- encryption scheme
- authentication protocol
- user authentication
- multiresolution
- authentication scheme
- security policies
- high dimensional
- proxy signature scheme