-
1
-
-
85037474492
-
-
Business Software Alliance, 2000. http://www.bsa.org.
-
(2000)
-
-
-
2
-
-
85037475281
-
-
The Trusted Computing Platform Allicance, 2000. http://www.trustedpc.com.
-
(2000)
-
-
-
4
-
-
0040362552
-
-
Technical Report CS-TN-00-97, Stanford University Computer Science
-
D. Boneh, D. Lie, P. Lincoln, J. Mitchell, and M. Mitchell. Hardware support for tamper-resistant and copy-resistant software. Technical Report CS-TN-00-97, Stanford University Computer Science, 2000.
-
(2000)
Hardware Support for Tamper-resistant and Copy-resistant Software
-
-
Boneh, D.1
Lie, D.2
Lincoln, P.3
Mitchell, J.4
Mitchell, M.5
-
6
-
-
84957079591
-
Towards sound approaches to counteract power analysis attacks
-
S. Chari, C. Jutla, J. Rao, and P. Rohatgi. Towards sound approaches to counteract power analysis attacks. In Proceedings of CRYPTO'99: 19th Annual International Cryptology Conference, volume 1666, pages 398-412, 1999.
-
(1999)
Proceedings of CRYPTO'99: 19th Annual International Cryptology Conference
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.2
Rao, J.3
Rohatgi, P.4
-
7
-
-
0004181422
-
-
Technical report, National Institute of Standards and Technology (NIST), March
-
J. Daemen and V. Rijmen. AES proposal: Rijndael. Technical report, National Institute of Standards and Technology (NIST), March 2000. Available at http://csrc.nist.gov/encryption/aes/round2/r2algs.htm.
-
(2000)
AES Proposal: Rijndael
-
-
Daemen, J.1
Rijmen, V.2
-
9
-
-
85037446344
-
-
Wave Corporation Embassy Technology, 2000. http://www.wave.com.
-
(2000)
-
-
-
11
-
-
0033221778
-
Hardware security for software privacy support
-
November
-
T. Gilmont, J.-D. Legat, and J.-J. Quisquater. Hardware security for software privacy support. Electronics Letters, 35 (24):2096-2097, November 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.24
, pp. 2096-2097
-
-
Gilmont, T.1
Legat, J.-D.2
Quisquater, J.-J.3
-
12
-
-
84926427148
-
Survey of virtual machine research
-
June
-
R.P. Goldberg. Survey of virtual machine research. IEEE Computer Magazine, 7(6):35-45, June 1974.
-
(1974)
IEEE Computer Magazine
, vol.7
, Issue.6
, pp. 35-45
-
-
Goldberg, R.P.1
-
13
-
-
0006595839
-
Message authentication with MD5
-
B. Kaliski Jr. and M. Robshaw. Message authentication with MD5. CryptoBytes, 1(1):5-8, 1995.
-
(1995)
CryptoBytes
, vol.1
, Issue.1
, pp. 5-8
-
-
Kaliski Jr., B.1
Robshaw, M.2
-
14
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Proceedings of CRYPTO'99: 19th Annual International Cryptology Conference, volume 1666, pages 388-397, 1999.
-
(1999)
Proceedings of CRYPTO'99: 19th Annual International Cryptology Conference
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
16
-
-
0040956706
-
-
Technical report, Calmers Microprocessor, February
-
K. Krewell. Quicktake: Willamette revealed. Technical report, Calmers Microprocessor, February 2000. Available at www.MPRonline.com.
-
(2000)
Quicktake: Willamette Revealed
-
-
Krewell, K.1
-
17
-
-
84976834054
-
Authenticaton in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authenticaton in distributed systems: Theory and practice. In Proceedings of the 13th ACM Symposium on Operating Systems, volume 10, pages 265-310, 1992.
-
(1992)
Proceedings of the 13th ACM Symposium on Operating Systems
, vol.10
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
20
-
-
0039177903
-
-
National Bureau of Standards, U.S. Department of Commerce, January
-
National Bureau of Standards. NBS FIPS PUB 46, "Data Encryption Standard". National Bureau of Standards, U.S. Department of Commerce, January 1977.
-
(1977)
NBS FIPS PUB 46, "Data Encryption Standard"
-
-
-
21
-
-
0034429731
-
Non-invasive timing analysis of IBM G6 microprocessor L1 cache using backside time-resolved hot electron luminescence
-
S. Polonsky, D. Knebel, P. Sanda, M. McManus, W. Huott, A. Pelella, D. Manzer, S. Steen, S. Wilson, and Y. Chan. Non-invasive timing analysis of IBM G6 microprocessor L1 cache using backside time-resolved hot electron luminescence. In Proceedings of the IEEE International Solid-state Circuits Conference, pages 222-224, 2000.
-
(2000)
Proceedings of the IEEE International Solid-state Circuits Conference
, pp. 222-224
-
-
Polonsky, S.1
Knebel, D.2
Sanda, P.3
McManus, M.4
Huott, W.5
Pelella, A.6
Manzer, D.7
Steen, S.8
Wilson, S.9
Chan, Y.10
-
22
-
-
0039177901
-
American national standard for financial institution key management (wholesale)
-
American Bankers Association
-
ANSI X9.17 (Revised). American national standard for financial institution key management (wholesale). American Bankers Association, 1985.
-
(1985)
ANSI X9.17 (Revised).
-
-
-
23
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. Saltzer and M. Schroeder. The protection of information in computer systems. IEEE, 63(9):1278-1308, September 1975.
-
(1975)
IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
25
-
-
0003156767
-
Hellman presents no shortcut solutions to des
-
July
-
W. Tuchman. Hellman presents no shortcut solutions to DES. IEEE Spectrum, 16(7):40-41, July 1979.
-
(1979)
IEEE Spectrum
, vol.16
, Issue.7
, pp. 40-41
-
-
Tuchman, W.1
-
27
-
-
0003656468
-
-
Technical report, National Security Agency, August
-
B. Weeks, M. Bean, T. Rozylowicz, and C. Ficke. Hardware performance simulations of round 2 advanced encryption standard algorithms. Technical report, National Security Agency, August 2000. Available at http://csrc.nist.gov/encryption/aes/round2/r2anlsys.htm.
-
(2000)
Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms
-
-
Weeks, B.1
Bean, M.2
Rozylowicz, T.3
Ficke, C.4
|