1Security 2 * An adversary with access to precise enough information about memory 3 accesses (typically, an untrusted operating system attacking a secure 4 enclave) could recover an RSA private key after observing the victim 5 performing a single private-key operation if the window size used for the 6 exponentiation was 3 or smaller. Found and reported by Zili KOU, 7 Wenjian HE, Sharad Sinha, and Wei ZHANG. See "Cache Side-channel Attacks 8 and Defenses of the Sliding Window Algorithm in TEEs" - Design, Automation 9 and Test in Europe 2023. 10 11