b3608afe29
Signed-off-by: Janos Follath <janos.follath@arm.com>
8 lines
427 B
Text
8 lines
427 B
Text
Security
|
|
* An adversary with access to precise enough information about memory
|
|
accesses (typically, an untrusted operating system attacking a secure
|
|
enclave) could recover an RSA private key after observing the victim
|
|
performing a single private-key operation if the window size used for the
|
|
exponentiation was 3 or smaller. Found and reported by Zili KOU,
|
|
Wenjian HE, Sharad Sinha, and Wei ZHANG.
|
|
|