<--- Back to Details
First PageDocument Content
Computer security / Cryptography / Trusted computing / Computer architecture / X86 instructions / Elliptic curve cryptography / Enhanced privacy ID / Software Guard Extensions / Digital signature / Public-key cryptography / Trusted Execution Technology / CPU cache
Date: 2018-08-09 16:06:58
Computer security
Cryptography
Trusted computing
Computer architecture
X86 instructions
Elliptic curve cryptography
Enhanced privacy ID
Software Guard Extensions
Digital signature
Public-key cryptography
Trusted Execution Technology
CPU cache

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks

Add to Reading List

Source URL: web.eecs.umich.edu

Download Document from Source Website

File Size: 641,87 KB

Share Document on Facebook

Similar Documents

The second era of the internet, digital signature infrastructures and trusted entities KSI, PKI and Permissioned Blockchain By Eduardo Lacerda A new era of technology, born on the great platform of digital information, w

The second era of the internet, digital signature infrastructures and trusted entities KSI, PKI and Permissioned Blockchain By Eduardo Lacerda A new era of technology, born on the great platform of digital information, w

DocID: 1vdvG - View Document

FACTSHEET  e-identity “With the digital signature and the machinereadable ID card, we created the e-citizen.” Former President of Estonia –

FACTSHEET e-identity “With the digital signature and the machinereadable ID card, we created the e-citizen.” Former President of Estonia –

DocID: 1uYfU - View Document

Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes Joseph A. Akinyele∗§ Matthew Green∗†

Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes Joseph A. Akinyele∗§ Matthew Green∗†

DocID: 1uV7t - View Document

GUIDELINES FOR SCANNING THE PHOTOGRAPH & SIGNATURE Before applying online a candidate is required to have a scanned (digital) image of his/her photograph and signature as per the specifications given below. (i) PHOTOGRAP

GUIDELINES FOR SCANNING THE PHOTOGRAPH & SIGNATURE Before applying online a candidate is required to have a scanned (digital) image of his/her photograph and signature as per the specifications given below. (i) PHOTOGRAP

DocID: 1uG1X - View Document