Lines Matching full:attack
145 # input to block function is distributed *uniformly*, then attack
151 # combinations then attack becomes infeasible. This is why revised
165 # cache state. For this attack to be efficient attacker would have to
170 # statistical data to mount the attack. It's probably appropriate to
171 # say that if adeversary reckons that this attack is beneficial and
174 # to preclude/mitigate this attack by overall system security design.
176 # this kind of attack to be feasible, interrupt rate has to be high
182 # Intel P4. Recall that asynchronous attack implies that malicious