Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryptio

Authors: 

Wei Peng and Yinshuai Li, Southern University of Science and Technology; Yinqian Zhang, SUSTech