The attack is effective against various cryptographic algorithms, even those designed to resist chosen-input attacks.
Running cryptographic processes on specific CPU cores lacking the DMP may also be necessary but could further impact performance.
Marcus Mears III / How-To Geek