F Hategekimana, TJL Whitaker,
MJH Pantho… - Journal of Systems …, 2020 - Elsevier
… from the software level, … using the server’s public RSA key, done with a write to the RSA
core’s input memory index, followed by a read out of the encrypted cipher. Finally, we package …