Login / Signup
Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis.
Ben Lapid
Avishai Wool
Published in:
SAC (2018)
Keyphrases
</>
advanced encryption standard
statistical analysis
data mining
neural network
database systems
data structure
query processing
data access
fault model
cryptographic algorithms