Lines Matching refs:access
271 * An adversary with access to precise enough information about memory
276 * An adversary with access to precise enough timing information (typically, a
492 making access aceess to them use constant flow code.
742 Encrypt-then-Mac extension, use constant code flow memory access patterns
747 if they have access to fine-grained measurements. In particular, this
752 Diffie-Hellman. An adversary with precise enough timing and memory access
849 f_rng argument. An attacker with access to precise enough timing and
850 memory access information (typically an untrusted operating system
948 * Fix side channel in ECC code that allowed an adversary with access to
949 precise enough timing and memory access information (typically an
1503 * Fix timing variations and memory access variations in RSA PKCS#1 v1.5
1513 via branching and memory access patterns. An attacker who could submit
1541 to trigger a memory access up to 64KiB beyond the incoming message buffer,
3443 * Possible remotely-triggered out-of-bounds memory access fixed (found by
3528 * Possible remotely-triggered out-of-bounds memory access fixed (found by