메뉴 건너뛰기




Volumn 34, Issue 5, 2000, Pages 168-177

Architectural support for copy and tamper resistant software

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0039927533     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/384264.379237     Document Type: Article
Times cited : (52)

References (27)
  • 1
    • 0040956712 scopus 로고    scopus 로고
    • Business Software Alliance, 2000. http://www.bsa.org.
    • (2000)
  • 2
    • 0040362556 scopus 로고    scopus 로고
    • The Trusted Computing Platform Allicance, 2000. http://www.trustedpc.com.
    • (2000)
  • 3
    • 0039770370 scopus 로고    scopus 로고
    • A proposal for the advanced encryption standard
    • National Institute of Standards and Technology (NIST), March
    • R. Anderson, E. Biham, and L. Knudsen. Serpent: A proposal for the advanced encryption standard. Technical report, National Institute of Standards and Technology (NIST), March 2000. Available at http://csrc.nist.gov/encryption/aes/round2/r2algs.htm.
    • (2000) Technical Report
    • Anderson, R.1    Biham, E.2    Serpent, L.K.3
  • 4
    • 0040362552 scopus 로고    scopus 로고
    • Hardware support for tamper-resistant and copy-resistant software
    • Stanford University Computer Science
    • D. Boneh, D. Lie, P. Lincoln, J. Mitchell, and M. Mitchell. Hardware support for tamper-resistant and copy-resistant software. Technical Report CS-TN-00-97, Stanford University Computer Science, 2000.
    • (2000) Technical Report CS-TN-00-97
    • Boneh, D.1    Lie, D.2    Lincoln, P.3    Mitchell, J.4    Mitchell, M.5
  • 7
    • 0004181422 scopus 로고    scopus 로고
    • AES proposal: Rijndael
    • National Institute of Standards and Technology (NIST), March
    • J. Daemen and V. Rijmen. AES proposal: Rijndael. Technical report, National Institute of Standards and Technology (NIST), March 2000. Available at http://csrc.nist.gov/encryption/aes/round2/r2algs.htm.
    • (2000) Technical Report
    • Daemen, J.1    Rijmen, V.2
  • 9
    • 0040362554 scopus 로고    scopus 로고
    • Wave Corporation Embassy Technology, 2000. http://www.wave.com.
    • (2000)
  • 11
    • 0033221778 scopus 로고    scopus 로고
    • Hardware security for software privacy support
    • November
    • T. Gilmont, J.-D. Legat, and J.-J. Quisquater. Hardware security for software privacy support. Electronics Letters, 35(24):2096-2097, November 1999.
    • (1999) Electronics Letters , vol.35 , Issue.24 , pp. 2096-2097
    • Gilmont, T.1    Legat, J.-D.2    Quisquater, J.-J.3
  • 12
    • 84926427148 scopus 로고
    • Survey of virtual machine research
    • June
    • R.P. Goldberg. Survey of virtual machine research. IEEE Computer Magazine, 7(6):35-45, June 1974.
    • (1974) IEEE Computer Magazine , vol.7 , Issue.6 , pp. 35-45
    • Goldberg, R.P.1
  • 13
    • 0006595839 scopus 로고
    • Message authentication with MD5
    • B. Kaliski Jr. and M. Robshaw. Message authentication with MD5. CryptoBytes, 1(1):5-8, 1995.
    • (1995) CryptoBytes , vol.1 , Issue.1 , pp. 5-8
    • Kaliski B., Jr.1    Robshaw, M.2
  • 16
    • 0040956706 scopus 로고    scopus 로고
    • Quicktake: Willamette revealed
    • Calmers Microprocessor, February
    • K. Krewell. Quicktake: Willamette revealed. Technical report, Calmers Microprocessor, February 2000. Available at www.MPRonline.com.
    • (2000) Technical Report
    • Krewell, K.1
  • 20
    • 0039177903 scopus 로고
    • National Bureau of Standards, U.S. Department of Commerce, January
    • National Bureau of Standards. NBS FIPS PUB 46, "Data Encryption Standard". National Bureau of Standards, U.S. Department of Commerce, January 1977.
    • (1977) NBS FIPS PUB 46, "Data Encryption Standard"
  • 23
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. Saltzer and M. Schroeder. The protection of information in computer systems. IEEE, 63(9):1278-1308, September 1975.
    • (1975) IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 25
    • 0003156767 scopus 로고
    • Hellman presents no shortcut solutions to DES
    • July
    • W. Tuchman. Hellman presents no shortcut solutions to DES. IEEE Spectrum, 16(7):40-41, July 1979.
    • (1979) IEEE Spectrum , vol.16 , Issue.7 , pp. 40-41
    • Tuchman, W.1
  • 26
    • 0038650651 scopus 로고
    • Dyad: A system for using physically secure coprocessors
    • Carnegie Mellon University, May
    • J. Tygar and B. Yee. Dyad: A system for using physically secure coprocessors. Technical Report CMU-CS-91-140R, Carnegie Mellon University, May 1991.
    • (1991) Technical Report CMU-CS-91-140R
    • Tygar, J.1    Yee, B.2
  • 27
    • 0003656468 scopus 로고    scopus 로고
    • Hardware performance simulations of round 2 advanced encryption standard algorithms
    • National Security Agency, August
    • B. Weeks, M. Bean, T. Rozylowicz, and C. Ficke. Hardware performance simulations of round 2 advanced encryption standard algorithms. Technical report, National Security Agency, August 2000. Available at http://csrc.nist.gov/encryption/aes/round2/r2anlsys.htm.
    • (2000) Technical Report
    • Weeks, B.1    Bean, M.2    Rozylowicz, T.3    Ficke, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.