2 code implementations • 13 Nov 2018 • Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss
Our systematization does not only yield a complete picture of the attack surface, but also allows a systematic evaluation of defenses.
Cryptography and Security