Login / Signup
Exploiting RPMB authentication in a closed source TEE implementation.
Aya Fukami
Richard Buurke
Zeno Geradts
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
implementation issues
implementation details
databases
efficient implementation
real world
website
database systems