-
1
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
Nov.
-
D.Lie, C.Thekkath, M.Mitchell, P.Lincoln, D.Boneh, J.Mitchell, M.Horowitz, "Architectural Support for Copy and Tamper Resistant Software," International Conference on Architectural Support for Programming Languages and Operating Systems, Nov. 2000.
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
4
-
-
84944412608
-
Efficient memory integrity verification and encryption for secure processors
-
Dec.
-
E.Suh, D.Clarke, B.Gassend, M.v.Dijk, S.Devadas, "Efficient Memory Integrity Verification and Encryption for Secure Processors", International Symposium on Microarchitecture, Dec. 2003.
-
(2003)
International Symposium on Microarchitecture
-
-
Suh, E.1
Clarke, D.2
Gassend, B.3
Dijk, M.V.4
Devadas, S.5
-
5
-
-
84955507265
-
Caches and hash trees for efficient memory integrity verification
-
Feb.
-
B.Gassend, G.E.Suh, D.Clarke, M.v.Dijk, S.Devadas, "Caches and Hash Trees for Efficient Memory Integrity Verification", International Symposium on High Performance Computer Architecture, Feb. 2003.
-
(2003)
International Symposium on High Performance Computer Architecture
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
Dijk, M.V.4
Devadas, S.5
-
6
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
Jun.
-
G.E.Suh, D.Clarke, B.Gassend, M.v.Dijk, S.Devadas, "AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing," International Conference on Supercomputing, Jun. 2003.
-
(2003)
International Conference on Supercomputing
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Dijk, M.V.4
Devadas, S.5
-
7
-
-
0032180824
-
Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP
-
M.G.Kuhn, "Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP," IEEE Transaction on Computers, Vol.47, No.10, pp.1153-1157, 1998.
-
(1998)
IEEE Transaction on Computers
, vol.47
, Issue.10
, pp. 1153-1157
-
-
Kuhn, M.G.1
-
8
-
-
0038650645
-
The TrustNo 1 cryptoprocessor concept
-
Purdue Univ.
-
M.Kuhn, "The TrustNo 1 Cryptoprocessor Concept," CS555 Report, Purdue Univ. 1997.
-
(1997)
CS555 Report
-
-
Kuhn, M.1
-
10
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O.Goldreich, R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," Journal of the ACM, Vol.43, No.3, 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
-
-
Goldreich, O.1
Ostrovsky, R.2
-
11
-
-
12844286476
-
DS5002FP secure microprocessor chip data sheet
-
"DS5002FP secure microprocessor chip data sheet," Dallas Semiconductor.
-
Dallas Semiconductor
-
-
-
12
-
-
0016870630
-
An algorithm for subgraph isomorphism
-
J.R.Ullman, "An Algorithm for subgraph Isomorphism," Journal of the ACM, Vol.23, pp.31-42, 1976.
-
(1976)
Journal of the ACM
, vol.23
, pp. 31-42
-
-
Ullman, J.R.1
-
13
-
-
84860082756
-
-
VFLib Graph Matching Library, http://amalfi.dis.unina.it/graph/db/vflib- 2.0/doc/vflib-1.html
-
-
-
-
14
-
-
0141890488
-
Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems
-
P.C.Kocher, "Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems," International Cryptology Conference, 1996.
-
(1996)
International Cryptology Conference
-
-
Kocher, P.C.1
-
17
-
-
0003465202
-
The SimpleScalar tool set version 2.0
-
Univ. of Wisconsin-Madison, May
-
D.Burger, T.M.Austin. "The SimpleScalar Tool Set Version 2.0," TR. 1342, Univ. of Wisconsin-Madison, May 1997.
-
(1997)
TR
, vol.1342
-
-
Burger, D.1
Austin, T.M.2
-
19
-
-
0002034673
-
Side channel cryptanalysis of product ciphers
-
Sep.
-
J. Kelsey, B. Schneier, D.Wagner, and C. Hall, "Side channel cryptanalysis of product ciphers," European Symposium on Research in Computer Security, Sep. 1998
-
(1998)
European Symposium on Research in Computer Security
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
21
-
-
12344287059
-
Keeping secrets in hardware: The Microsoft Xbox (TM) case study
-
May 26
-
A.Huang, "Keeping Secrets in Hardware: the Microsoft Xbox (TM) Case Study," MIT TR. AIM-2002-008, May 26, 2002.
-
(2002)
MIT TR
, vol.AIM-2002-008
-
-
Huang, A.1
-
22
-
-
84860051594
-
Software reuse planning by way of domain analysis
-
Technical Paper
-
C. McClure, "Software Reuse Planning by Way of Domain Analysis," Technical Paper, Extended Intelligence, Inc. http://www.reusability.com.
-
Extended Intelligence, Inc.
-
-
McClure, C.1
-
24
-
-
0242612471
-
Leakage-proof program partitioning
-
Oct.
-
T.Zhang, S.Pande, A.D.Santos, F.Bruecklmayer, "Leakage-proof Program Partitioning," International Conference on Compiler, Architecture and Synthesis for Embedded Systems, Oct. 2002.
-
(2002)
International Conference on Compiler, Architecture and Synthesis for Embedded Systems
-
-
Zhang, T.1
Pande, S.2
Santos, A.D.3
Bruecklmayer, F.4
-
25
-
-
0242696246
-
Tamper-resistant whole program partitioning
-
Jun.
-
T.Zhang, S.Pande, A.Valverde, "Tamper-resistant Whole Program Partitioning," International Conference on Languages, Compilers, and Tools for Embedded Systems, Jun. 2003.
-
(2003)
International Conference on Languages, Compilers, and Tools for Embedded Systems
-
-
Zhang, T.1
Pande, S.2
Valverde, A.3
|