TRESOR-HUNT: attacking CPU-bound encryption.
Erik-Oliver BlassWilliam RobertsonPublished in: ACSAC (2012)
Keyphrases
- upper bound
- lower bound
- worst case
- encryption algorithms
- image encryption
- encryption decryption
- key management
- data sets
- random number
- gpu implementation
- vc dimension
- error bounds
- encryption scheme
- ciphertext
- security properties
- human computation
- key exchange
- parallel algorithm
- neural network
- database
- multimedia streaming