作者: Pratyusa K. Manadhata , Stuart Haber , Amro J. Awad , William G. Horne
DOI:
关键词:
摘要: A technique includes receiving a request to initialize region of memory. Content that is stored in the encrypted based at least part on nonce value and key. The includes, response request, performing cryptographic-based initialization memory, including altering