-
2
-
-
0029308368
-
Effective hardware-based data prefetching for high-performance processors
-
J.-L. Baer and T.-F. Chen. Effective Hardware-Based Data Prefetching for High-Performance Processors. IEEE Transactions on Computers, 44(5):609-623, 1995.
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.5
, pp. 609-623
-
-
Baer, J.-L.1
Chen, T.-F.2
-
3
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE Computer Society
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science, page 394. IEEE Computer Society, 1997.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science
, pp. 394
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
5
-
-
0026917364
-
Reducing memory latency via non-blocking and prefetching caches
-
New York, NY . ACM Press
-
T.-F. Chen and J.-L. Baer. Reducing Memory Latency via Non-blocking and Prefetching Caches. In Proceedings of the 5th International Conference on Architectural Support for Programming Languages and Operating System), volume 27, pages 51-61, New York, NY, 1992. ACM Press.
-
(1992)
Proceedings of the 5th International Conference on Architectural Support for Programming Languages and Operating System
, vol.27
, pp. 51-61
-
-
Chen, T.-F.1
Baer, J.-L.2
-
7
-
-
0018443381
-
Privacy and authentication: An introduction to cryptography
-
W. Diffie and M. Hellman. Privacy and Authentication: An Introduction to Cryptography. In Proceedings of the IEEE, 67, 1979.
-
(1979)
Proceedings of the IEEE
, vol.67
-
-
Diffie, W.1
Hellman, M.2
-
8
-
-
27544474796
-
-
Advanced Encryption Standard (AES). National Institute of Standards and Technology
-
F. I. P. S. Draft. Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2001.
-
(2001)
F. I. P. S. Draft
-
-
-
12
-
-
0034445599
-
Architectual support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. B. J. Mitchell, and M. Horowitz. Architectual Support For Copy and Tamper Resistant Software. In Proceedings of the 9th Symposium on Architectural Support for Programming Languages and Operating Systems, 2000.
-
(2000)
Proceedings of the 9th Symposium on Architectural Support for Programming Languages and Operating Systems
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Mitchell, D.B.J.5
Horowitz, M.6
-
15
-
-
84855630085
-
Comments to NIST concerning AES-modes of operations: CTR-mode encryption
-
H. Lipmaa, P. Rogaway, and D. Wagner. Comments to NIST Concerning AES-modes of Operations: CTR-mode Encryption. In In Symmetric Key Block Cipher Modes of Operation Workshop, Baltimore, Maryland, US, 2000.
-
(2000)
In Symmetric Key Block Cipher Modes of Operation Workshop, Baltimore, Maryland, US
-
-
Lipmaa, H.1
Rogaway, P.2
Wagner, D.3
-
18
-
-
0036953769
-
Automatically characterizing large scale program behavior
-
Oct.
-
T. Sherwood, E. Perelman, G. Hamerly, and B. Calder. Automatically Characterizing Large Scale Program Behavior. In Proceedings of the 10th Symposium on Architectural Support for Programming Languages and Operating Systems, pages 45-57, Oct. 2002.
-
(2002)
Proceedings of the 10th Symposium on Architectural Support for Programming Languages and Operating Systems
, pp. 45-57
-
-
Sherwood, T.1
Perelman, E.2
Hamerly, G.3
Calder, B.4
-
19
-
-
27544504952
-
Towards the issues in architectural support for protection of software execution
-
W. Shi, H.-H. S. Lee, C. Lu, and M. Ghosh. Towards the Issues in Architectural Support for Protection of Software Execution. In Workshop on Architectural support for Security and Anti-Virus, pages 1-10, 2004.
-
(2004)
Workshop on Architectural Support for Security and Anti-virus
, pp. 1-10
-
-
Shi, W.1
Lee, H.-H.S.2
Lu, C.3
Ghosh, M.4
-
20
-
-
84944412608
-
Efficient memory integrity verification and encryption for secure processors
-
December
-
E. G. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. Efficient Memory Integrity Verification and Encryption for Secure Processors. In Proceedings Of the 36th Annual International Symposium on Microarchitecture, December, 2003.
-
(2003)
Proceedings of the 36th Annual International Symposium on Microarchitecture
-
-
Suh, E.G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
21
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
E. G. Suh, D. Clarke, M. van Dijk, B. Gassend, and S.Devadas. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In Proceedings of The Int'l Conference on Supercomputing, 2003.
-
(2003)
Proceedings of the Int'l Conference on Supercomputing
-
-
Suh, E.G.1
Clarke, D.2
Van Dijk, M.3
Gassend, B.4
Devadas, S.5
-
23
-
-
0038345683
-
Guided region prefetching: A cooperative hardware/software approach
-
June
-
Z. Wang, D. Burger, K. S. McKinley, S. K. Reinhardt, and C. C. Weems. Guided Region Prefetching: A Cooperative Hardware/Software Approach. In Proceedings of the 30th Annual International Symposium on Computer Architecture, pages 388-398, June 2003.
-
(2003)
Proceedings of the 30th Annual International Symposium on Computer Architecture
, pp. 388-398
-
-
Wang, Z.1
Burger, D.2
McKinley, K.S.3
Reinhardt, S.K.4
Weems, C.C.5
|