-
1
-
-
84944412608
-
Efficient memory integrity verification and encryption for secure processors
-
December
-
G. Edward Suh, D. Clarke, B. Gassend, M. van Dijk, S. Devadas, "Efficient Memory Integrity Verification and Encryption for Secure Processors", Proceedings of the 36th International Symposium on Microarchitecture (MICRO), December 2003.
-
(2003)
Proceedings of the 36th International Symposium on Microarchitecture (MICRO)
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
3
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
November
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horwitz, "Architectural Support for Copy and Tamper Resistant Software," ACM 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), pages 168-177, November 2000.
-
(2000)
ACM 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horwitz, M.7
-
4
-
-
84955507265
-
Caches and Merkle trees for efficient memory integrity verification
-
February
-
B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, and S. Devadas. "Caches and Merkle Trees for Efficient Memory Integrity Verification:, In Proceedings of Ninth International Symposium on High Performance Computer Architecture, February 2003.
-
(2003)
Proceedings of Ninth International Symposium on High Performance Computer Architecture
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
5
-
-
0003465202
-
The simpleScalar tool set, version 2.0
-
Univ. of Wisconsin-Madison, Jun
-
D. Burger and T. Austin, "The SimpleScalar Tool Set, Version 2.0," CS-TR-97-1342, Univ. of Wisconsin-Madison, Jun 1997.
-
(1997)
CS-TR-97-1342
-
-
Burger, D.1
Austin, T.2
-
7
-
-
0003851399
-
-
Wiley, October
-
Bruce Schneier, "Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition", Wiley, October 1995.
-
(1995)
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
-
-
Schneier, B.1
-
8
-
-
84893793732
-
Masking the energy behavior of des encryption
-
Messe Munich, Germany
-
H. Saputra, N. Vijaykrishnan, M. Kandemir, M. J. Irwin, R. Brooks, S. Kim and W. Zhang. "Masking the Energy Behavior of DES Encryption", In the Proceedings of the Design Automation and Test in Europe Conference (Date'03), Messe Munich, Germany, 2003
-
(2003)
The Proceedings of the Design Automation and Test in Europe Conference (Date'03)
-
-
Saputra, H.1
Vijaykrishnan, N.2
Kandemir, M.3
Irwin, M.J.4
Brooks, R.5
Kim, S.6
Zhang, W.7
-
9
-
-
0003508558
-
-
FIPS PUB 197, November
-
N. I. of Science and Technology, FIPS PUB 197, "Advanced Encryption Standard (AES)", November 2001
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
10
-
-
0025228221
-
Interprocedural slicing using dependence graphs
-
January
-
S. Horwitz, T. Reps, D. Binkley, "Interprocedural Slicing Using Dependence Graphs". ACM Transactions on Programming Languages and Systems 12, 1 (January 1990), 26-60.
-
(1990)
ACM Transactions on Programming Languages and Systems
, vol.12
, Issue.1
, pp. 26-60
-
-
Horwitz, S.1
Reps, T.2
Binkley, D.3
-
11
-
-
26844482234
-
ARM adding hardware-based security to its processor cores
-
May
-
ARM adding hardware-based security to its processor cores. Computer World, May 2003
-
(2003)
Computer World
-
-
|