메뉴 건너뛰기




Volumn , Issue , 2004, Pages 123-134

Architectural support for high speed protection of memory integrity and confidentiality in multiprocessor systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; AUTHENTICATION SPECULATIVE EXECUTION (ASE); MEMORY CONTROLLER; MEMORY PROTECTION;

EID: 10444227999     PISSN: 1089795X     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (64)

References (15)
  • 2
    • 84897692885 scopus 로고    scopus 로고
    • Federal information processing standard draft
    • National Institute of Standards and Technology
    • Federal Information Processing Standard Draft. Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2001.
    • (2001) Advanced Encryption Standard (AES)
  • 3
    • 0037514488 scopus 로고
    • Performance optimizations, implementation, and verification of the SGI challenge multiprocessor
    • Mountain View
    • M. Galles and E. Williams. Performance Optimizations, Implementation, and Verification of the SGI Challenge Multiprocessor. In Technical report, Silicon Graphics Computer Systems, Mountain View, 1994.
    • (1994) Technical Report, Silicon Graphics Computer Systems
    • Galles, M.1    Williams, E.2
  • 5
    • 10444260126 scopus 로고    scopus 로고
    • Performance evaluation of recent DRAM architectures for embedded systems
    • Computing Engineering and Networks Lab (TIK), Swiss Federal Institute of Technology (ETH) Zurich, November
    • Matthias Gries and Andreas Romer. Performance Evaluation of Recent DRAM Architectures for Embedded Systems. In TIK Report Nr. 82, Computing Engineering and Networks Lab (TIK), Swiss Federal Institute of Technology (ETH) Zurich, November 1999.
    • (1999) TIK Report Nr. 82 , vol.82
    • Gries, M.1    Romer, A.2
  • 6
    • 84862471188 scopus 로고    scopus 로고
    • The Trusted Computing Group. https://www.trustedcomputinggroup.org/home.
  • 7
    • 10444223411 scopus 로고    scopus 로고
    • Keeping secrets in hardware the microsoft XBOX case study
    • A. Huang. Keeping Secrets in Hardware the Microsoft XBOX Case Study. MIT AI Memo, 2002.
    • (2002) MIT AI Memo
    • Huang, A.1
  • 9
    • 10444284573 scopus 로고    scopus 로고
    • National Institute of Science and Technology. FIPS PUB 180-2: SHA256 Hashing Algorithm
    • National Institute of Science and Technology. FIPS PUB 180-2: SHA256 Hashing Algorithm.
  • 10
    • 0003533356 scopus 로고    scopus 로고
    • RSIM reference manual. Version 1.0
    • Department of Electrical and Computer Engineering, Rice University
    • Vijay S. Pai, Parthasarathy Ranganathan, and Sarita V. Adve. RSIM Reference Manual. Version 1.0. In Department of Electrical and Computer Engineering, Rice University. Technical Report 9705, 1997.
    • (1997) Technical Report , vol.9705
    • Pai, V.S.1    Ranganathan, P.2    Adve, S.V.3
  • 13
    • 0030149507 scopus 로고    scopus 로고
    • Cacti: An enhanced cache access and cycle time model
    • May
    • S. Wilton and N. Jouppi. Cacti: An enhanced cache Access and Cycle Time Model. In IEEE Journal of Solid-State Circuits, vol. 31, no. 5, pages 677-688, May 1996.
    • (1996) IEEE Journal of Solid-state Circuits , vol.31 , Issue.5 , pp. 677-688
    • Wilton, S.1    Jouppi, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.