Login / Signup
Remote Timing Attacks are Still Practical.
Billy Bob Brumley
Nicola Tuveri
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
countermeasures
computer security
neural network
real world
genetic algorithm
search engine
database
real time
information retrieval
artificial intelligence
website
cooperative
practical application
security mechanisms
security threats
block cipher