Login / Signup

Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis.

Ben LapidAvishai Wool
Published in: SAC (2018)
Keyphrases
  • advanced encryption standard
  • statistical analysis
  • data mining
  • neural network
  • database systems
  • data structure
  • query processing
  • data access
  • fault model
  • cryptographic algorithms