Liste des Groupes | Revenir à c arch |
Terje Mathisen wrote:
Usually, when a CPU needs to work on something, it will need to get
the data into $L1 anyway? It is only when the work is simply to be a
pipeline that having a way to bypass the CPU completely really makes
a difference, right?
Right. But my point is that the CPU never really need to "work" on theIf the keys are visible in application memory, Spectré like attacks can
encrypted data. It it frequently only sent to, or received from the
network or a storage device, hence the pipelined approach has
advantages.
Les messages affichés proviennent d'usenet.