37

Computing with Time: Microarchitectural Weird Machines

I browsed the article but didn't see any reference to increased power use or efficiency. Would such a proposed scheme only be used for cryptography and the remainder of the program run conventionally?

33 minutes agotimealyzer

In short, timing-attack computed?