Secrets

Results: 2333



#Item
1IC / CHIP / Intel MCS-51 / Computer architecture

GreenArrays™ World Leader toward Efficiency Secrets of Frugality in Context of an Exercise Greg Bailey

Add to Reading List

Source URL: www.forth.org

Language: English - Date: 2013-12-11 18:44:28
2Computer security / Cryptography / Trusted computing / Computer architecture / X86 instructions / Elliptic curve cryptography / Enhanced privacy ID / Software Guard Extensions / Digital signature / Public-key cryptography / Trusted Execution Technology / CPU cache

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2018-08-09 16:06:58
3Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Lie groups / Ring learning with errors / Learning with errors / Lattice / Homomorphic encryption / Order / Entropy / Ring learning with errors key exchange

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets Zvika Brakerski Renen Perlman Weizmann Institute of Science∗ Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-21 15:18:19
4Communication / Forward-looking statement / Promethean

PROMETHEAN LABS LLC LEGAL NOTICE The information contained in this website is confidential and may constitute trade secrets and information that is otherwise protected by applicable law. This website is only for informat

Add to Reading List

Source URL: www.logos.network

Language: English - Date: 2018-03-15 18:24:13
5Cryptography / Side-channel attacks / Public-key cryptography / Applied mathematics / RSA / Electromagnetic attack / GNU Privacy Guard / Chosen-ciphertext attack / Power analysis / Blinding / Elliptic-curve cryptography / Advanced Encryption Standard

contributed articles DOI:Computers broadcast their secrets via inadvertent physical emanations that are easily measured and exploited.

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-08-28 17:33:56
6Czech Silesia / esk Tn / Political geography / Geography of the Czech Republic / Divided regions / Cieszyn Silesia

Felix Purat from Czech Silesia Bracing the edge of the bilingual margin The whispering Odra runs secrets past my ear All is still in Český Těšín:

Add to Reading List

Source URL: origamipoems.com

Language: English - Date: 2018-10-06 11:37:57
7

Private Circuits II: Keeping Secrets in Tamperable Circuits Yuval Ishai? , Manoj Prabhakaran?? , Amit Sahai? ? ? , and David Wagner† Abstract. Motivated by the problem of protecting cryptographic hardware, we continue

Add to Reading List

Source URL: mmp.cs.illinois.edu

Language: English - Date: 2006-06-26 09:12:10
    8

    Island Studies Journal, Vol. 3, No. 2, 2008, ppBOOK REVIEWS SECTION Kathy MarksPitcairn, Paradise Lost: Uncovering the Dark Secrets of a South Pacific Fantasy Island, Pymble NSW, Australia, HarperColli

    Add to Reading List

    Source URL: www.islandstudies.ca

    Language: English - Date: 2009-12-17 14:08:02
      9

      SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution arXiv:1802.09085v3 [cs.CR] 3 JunGuoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai

      Add to Reading List

      Source URL: arxiv.org

      Language: English - Date: 2018-06-04 20:57:01
        10

        HOME Clues in the Attic: The Secrets to Winter Roof Maintenance NewsUSA

        Add to Reading List

        Source URL: www.newsusaadvantage.com

        Language: English - Date: 2014-09-12 10:25:00
          UPDATE