-
1
-
-
0003740150
-
"Advanced Encryption Standard (AES) Development Effort"
-
US Government
-
"Advanced Encryption Standard (AES) Development Effort," US Government, http://csrc.nist.gov/encryption/aes/, 2001.
-
(2001)
-
-
-
2
-
-
20344397061
-
-
ASICS.ws technical report
-
http://www.asics.ws/doc/aes_brief.pdf, ASICS.ws technical report, 2003.
-
(2003)
-
-
-
3
-
-
0012067158
-
"Sixth Annual BSA Global Software Piracy Study"
-
Int'l Planning and Research Corp
-
Int'l Planning and Research Corp., "Sixth Annual BSA Global Software Piracy Study," http://www.bsa.org/resources/2001-05-21.55.pdf, 2001.
-
(2001)
-
-
-
5
-
-
0003465202
-
"The SimpleScalar Too Set, Version 2.0"
-
Technical Report 1342, Computer Science Dept., Univ. of Wisconsin-Madison
-
D. Burger and T. Austin, "The SimpleScalar Too Set, Version 2.0," Technical Report 1342, Computer Science Dept., Univ. of Wisconsin-Madison, 1997.
-
(1997)
-
-
Burger, D.1
Austin, T.2
-
6
-
-
20344378873
-
-
CACTI3.2, HP-Compaq Western Research Lab
-
CACTI3.2, HP-Compaq Western Research Lab, http://research.compaq.com/wrl/ people/jouppi/CACTI.html, 2001.
-
(2001)
-
-
-
7
-
-
0036704573
-
"Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection"
-
Aug
-
C. Collberg and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection," IEEE Trans. Software Eng., vol. 28, no. 8, Aug. 2002.
-
(2002)
IEEE Trans. Software Eng.
, vol.28
, Issue.8
-
-
Collberg, C.1
Thomborson, C.2
-
8
-
-
0003812126
-
"An Introduction to Cryptography"
-
Network Associates, Inc
-
"An Introduction to Cryptography," Network Associates, Inc., http://www.pgpi.org/doc/pgpintro, 1999.
-
(1999)
-
-
-
10
-
-
0003508568
-
"Data Encryption Standard (DES)"
-
Federal Information Processing Standards Publication 46-2, Dec
-
"Data Encryption Standard (DES)," Federal Information Processing Standards Publication 46-2, Dec. 1993.
-
(1993)
-
-
-
12
-
-
84955507265
-
"Caches and Hash Trees for Efficient Memory Integrity Verification"
-
Feb
-
B. Gassend, G.E. Suh, D. Clarke, M.v. Dijk, and S. Devadas, "Caches and Hash Trees for Efficient Memory Integrity Verification," Proc Ninth Int'l Symp. High Performance Computer Architecture (HPCA9), Feb. 2003.
-
(2003)
Proc. Ninth Int'l Symp. High Performance Computer Architecture (HPCA9)
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
Dijk, M.V.4
Devadas, S.5
-
13
-
-
4544342362
-
"Minimum Area Cost for a 30 to 70 Gbits/s AES Processor"
-
Feb
-
A. Hodjat and I. Verbauwhede, "Minimum Area Cost for a 30 to 70 Gbits/s AES Processor," Proc. IEEE CS Ann. Symp. VLSI, pp. 83-88, Feb. 2004.
-
(2004)
Proc. IEEE CS Ann. Symp. VLSI
, pp. 83-88
-
-
Hodjat, A.1
Verbauwhede, I.2
-
14
-
-
0034863715
-
"L1 Data Cache Decomposition for Energy Efficiency"
-
M. Huang, J. Renau, S.M. Yoo, and J. Torrellas, "L1 Data Cache Decomposition for Energy Efficiency," Proc. IEEE/ACM Int'l Symp. Low Power Electronics and Design (ISLPED), pp. 10-15, 2001.
-
(2001)
Proc. IEEE/ACM Int'l Symp. Low Power Electronics and Design (ISLPED)
, pp. 10-15
-
-
Huang, M.1
Renau, J.2
Yoo, S.M.3
Torrellas, J.4
-
15
-
-
20344396035
-
"Sandia Researchers Develop World's Fastest Encryptor"
-
"Sandia Researchers Develop World's Fastest Encryptor," http://www.sandia.gov/media/NewsRel/NR1999/encrypt.htm, 1999.
-
(1999)
-
-
-
16
-
-
84889019266
-
"Enhancing the Security in the Memory Management Unit"
-
Sept
-
T. Gilmont, J.-D. Legat, and J.-J. Quisquater, "Enhancing the Security in the Memory Management Unit," Proc. 25th EuroMicro Conf., pp. 449-456, Sept. 1999.
-
(1999)
Proc. 25th EuroMicro Conf.
, pp. 449-456
-
-
Gilmont, T.1
Legat, J.-D.2
Quisquater, J.-J.3
-
17
-
-
20344403682
-
-
http://www.specbench.org/osg/cpu2000, 2000.
-
(2000)
-
-
-
18
-
-
0038650645
-
"The TrustNo1 Cryptoprocessor Concept"
-
technical report, Purdue Univ., Apr
-
M. Kuhn, "The TrustNo1 Cryptoprocessor Concept," technical report, Purdue Univ., Apr. 1997.
-
(1997)
-
-
Kuhn, M.1
-
19
-
-
0035510680
-
"Silent Stores and Store Value Locality"
-
Nov
-
K.M. Lepak, G.B. Bell, and M.H. Lipasti, "Silent Stores and Store Value Locality," IEEE Trans. Computers, vol. 50, no. 11, Nov. 2001.
-
(2001)
IEEE Trans. Computers
, vol.50
, Issue.11
-
-
Lepak, K.M.1
Bell, G.B.2
Lipasti, M.H.3
-
20
-
-
4444322842
-
"Specifying and Verifying Hardware for Tamper-Resistant Software"
-
D. Lie, J. Mitchell, C.A. Thekkath, and M. Horwitz, "Specifying and Verifying Hardware for Tamper-Resistant Software," Proc. IEEE Symp. Security and Privacy, 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
-
-
Lie, D.1
Mitchell, J.2
Thekkath, C.A.3
Horwitz, M.4
-
21
-
-
0034445599
-
"Architectural Support for Copy and Tamper Resistant Software"
-
Nov
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horwitz, "Architectural Support for Copy and Tamper Resistant Software," Proc. ACM Ninth Int'l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), pp. 168-177, Nov. 2000.
-
(2000)
Proc. ACM Ninth Int'l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horwitz, M.7
-
22
-
-
0021494484
-
"Hardware Protection against Software Piracy"
-
Sept
-
T. Maude and D. Maude, "Hardware Protection against Software Piracy," Comm. ACM, vol. 27, no. 9, pp. 950-959, Sept. 1984.
-
(1984)
Comm. ACM
, vol.27
, Issue.9
, pp. 950-959
-
-
Maude, T.1
Maude, D.2
-
23
-
-
0004132072
-
"Stream Ciphers"
-
Technical Report TR-701, version 2.0, RSA Laboratories
-
M.J.B. Robshaw, "Stream Ciphers," Technical Report TR-701, version 2.0, RSA Laboratories, 1995.
-
(1995)
-
-
Robshaw, M.J.B.1
-
25
-
-
84958045366
-
"Using a Higher Performance, Programmable Secure Coprocessor"
-
Feb
-
S.W. Smith, E.R. Palmer, and S. Weingart, "Using a Higher Performance, Programmable Secure Coprocessor," Financial Cryptography, pp. 73-89, Feb. 1998.
-
(1998)
Financial Cryptography
, pp. 73-89
-
-
Smith, S.W.1
Palmer, E.R.2
Weingart, S.3
-
27
-
-
84944412608
-
"Efficient Memory Integrity Verification and Encryption for Secure Processors"
-
Dec
-
G.E. Suh, D. Clarke, B. Gassend, M. vanDijk, and S. Devadas, "Efficient Memory Integrity Verification and Encryption for Secure Processors," Proc. 36th Intl Symp. Microarchitecture, pp. 339-350, Dec. 2003.
-
(2003)
Proc. 36th Intl Symp. Microarchitecture
, pp. 339-350
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
vanDijk, M.4
Devadas, S.5
-
28
-
-
0038650651
-
"Dyad: A System for Using Physically Secure Coprocessors"
-
Technical Report CMU-CS-91-140R, Carnegie Mellon Univ., May
-
J. Tygar and B. Yee, "Dyad: A System for Using Physically Secure Coprocessors," Technical Report CMU-CS-91-140R, Carnegie Mellon Univ., May 1991.
-
(1991)
-
-
Tygar, J.1
Yee, B.2
-
30
-
-
0034443222
-
"Frequent Value Locality and Value-Centric Data Cache Design"
-
Nov
-
Y. Zhang, J. Yang, and R. Gupta, "Frequent Value Locality and Value-Centric Data Cache Design," Proc. Int'l Conf. Architectural Support for Programming Languages and Operating Systems, pp. 150-159, Nov. 2000.
-
(2000)
Proc. Int'l Conf. Architectural Support for Programming Languages and Operating Systems
, pp. 150-159
-
-
Zhang, Y.1
Yang, J.2
Gupta, R.3
-
31
-
-
84944392287
-
"Fast Secure Processor for Inhibiting Software Piracy and Tampering"
-
Dec
-
Y. Zhang, J. Yang, and L. Gao, "Fast Secure Processor for Inhibiting Software Piracy and Tampering," Proc. 36th Int'l Symp. Microarchitecture, pp. 351-360, Dec. 2003.
-
(2003)
Proc. 36th Int'l Symp. Microarchitecture
, pp. 351-360
-
-
Zhang, Y.1
Yang, J.2
Gao, L.3
|