-
2
-
-
84897692885
-
Federal information processing standard draft
-
National Institute of Standards and Technology
-
Federal Information Processing Standard Draft. Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2001.
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
3
-
-
0037514488
-
Performance optimizations, implementation, and verification of the SGI challenge multiprocessor
-
Mountain View
-
M. Galles and E. Williams. Performance Optimizations, Implementation, and Verification of the SGI Challenge Multiprocessor. In Technical report, Silicon Graphics Computer Systems, Mountain View, 1994.
-
(1994)
Technical Report, Silicon Graphics Computer Systems
-
-
Galles, M.1
Williams, E.2
-
4
-
-
84955507265
-
Caches and merkle trees for efficient memory integrity verification
-
B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, and S. Devadas. Caches and Merkle Trees for Efficient Memory Integrity Verification. In Proceedings of the 9th International Symposium on High Performance Computer Architecte, 2003.
-
(2003)
Proceedings of the 9th International Symposium on High Performance Computer Architecte
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
5
-
-
10444260126
-
Performance evaluation of recent DRAM architectures for embedded systems
-
Computing Engineering and Networks Lab (TIK), Swiss Federal Institute of Technology (ETH) Zurich, November
-
Matthias Gries and Andreas Romer. Performance Evaluation of Recent DRAM Architectures for Embedded Systems. In TIK Report Nr. 82, Computing Engineering and Networks Lab (TIK), Swiss Federal Institute of Technology (ETH) Zurich, November 1999.
-
(1999)
TIK Report Nr. 82
, vol.82
-
-
Gries, M.1
Romer, A.2
-
6
-
-
84862471188
-
-
The Trusted Computing Group. https://www.trustedcomputinggroup.org/home.
-
-
-
-
7
-
-
10444223411
-
Keeping secrets in hardware the microsoft XBOX case study
-
A. Huang. Keeping Secrets in Hardware the Microsoft XBOX Case Study. MIT AI Memo, 2002.
-
(2002)
MIT AI Memo
-
-
Huang, A.1
-
8
-
-
0034445599
-
Architectual support for copy and tamper resistant software
-
D. Lie, C.Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectual Support For Copy and Tamper Resistant Software. In Proceedings of The 9th international Conference On Architectual Support For Programming Languages and Operating Systems, 2000.
-
(2000)
Proceedings of the 9th International Conference on Architectual Support for Programming Languages and Operating Systems
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
9
-
-
10444284573
-
-
National Institute of Science and Technology. FIPS PUB 180-2: SHA256 Hashing Algorithm
-
National Institute of Science and Technology. FIPS PUB 180-2: SHA256 Hashing Algorithm.
-
-
-
-
10
-
-
0003533356
-
RSIM reference manual. Version 1.0
-
Department of Electrical and Computer Engineering, Rice University
-
Vijay S. Pai, Parthasarathy Ranganathan, and Sarita V. Adve. RSIM Reference Manual. Version 1.0. In Department of Electrical and Computer Engineering, Rice University. Technical Report 9705, 1997.
-
(1997)
Technical Report
, vol.9705
-
-
Pai, V.S.1
Ranganathan, P.2
Adve, S.V.3
-
11
-
-
84944412608
-
Efficient memory integrity verification and encryption for secure processors
-
December
-
E. G. Suh, D. Clarke, B. Gassend, M. van Dijk, and S.Devadas. Efficient Memory Integrity Verification and Encryption for Secure Processors. In Proceedings of the 36th Annual International Symposium on Microarchitecture, December 2003.
-
(2003)
Proceedings of the 36th Annual International Symposium on Microarchitecture
-
-
Suh, E.G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
12
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
E. G. Suh, D. Clarke, M. van Dijk, B. Gassend, and S.Devadas. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing In Proceedings Of The International Conference on Supercomputing, 2003.
-
(2003)
Proceedings of the International Conference on Supercomputing
-
-
Suh, E.G.1
Clarke, D.2
Van Dijk, M.3
Gassend, B.4
Devadas, S.5
-
13
-
-
0030149507
-
Cacti: An enhanced cache access and cycle time model
-
May
-
S. Wilton and N. Jouppi. Cacti: An enhanced cache Access and Cycle Time Model. In IEEE Journal of Solid-State Circuits, vol. 31, no. 5, pages 677-688, May 1996.
-
(1996)
IEEE Journal of Solid-state Circuits
, vol.31
, Issue.5
, pp. 677-688
-
-
Wilton, S.1
Jouppi, N.2
-
14
-
-
0029179077
-
The SPLASH-2 programs: Characterization and methodological considerations
-
Italy
-
Steven Cameron Woo, Moriyoshi Ohara, Evan Torrie, Jaswinder Pal Singh, and Anoop Gupta. The SPLASH-2 Programs: Characterization and Methodological Considerations. In Proceedings of the 22nd International Symposium on Computer Architecture, pages pages 24-36, Italy, 1995.
-
(1995)
Proceedings of the 22nd International Symposium on Computer Architecture
, pp. 24-36
-
-
Woo, S.C.1
Ohara, M.2
Torrie, E.3
Singh, J.P.4
Gupta, A.5
|