-
3
-
-
0000694402
-
Low cost attacks on tamper resistant devices
-
IWSP: International Workshop on Security Protocols, Springer-Verlag, New York
-
ANDERSON, R. AND KUHN, M. 1997. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, LNCS. Springer-Verlag, New York.
-
(1997)
LNCS
-
-
ANDERSON, R.1
KUHN, M.2
-
5
-
-
18844373581
-
Microsoft "palladium": A business overview
-
CARROLL, A., JUAREZ, M., POLK, J., AND LEININGER, T. 2002. Microsoft "palladium": A business overview. In Microsoft Content Security Business Unit.
-
(2002)
Microsoft Content Security Business Unit
-
-
CARROLL, A.1
JUAREZ, M.2
POLK, J.3
LEININGER, T.4
-
7
-
-
39149128503
-
-
DISTRIBUTED.NET. http://distributed.nat/.
-
DISTRIBUTED.NET. http://distributed.nat/.
-
-
-
-
8
-
-
4344584084
-
-
M.S. thesis, Massachusetts Institute of Technology
-
GASSEND, B. 2003. Physical Random Functions. M.S. thesis, Massachusetts Institute of Technology.
-
(2003)
Physical Random Functions
-
-
GASSEND, B.1
-
9
-
-
46449138830
-
Controlled physical random functions
-
Applied Computer Security Associates ACSA, Silver Spring, MD
-
GASSEND, B., CLARKE, D., VAN DIJK, M., AND DEVADAS, S. 2002a. Controlled physical random functions . In Proceedings of 18th Annual Computer Security Applications Conference. Applied Computer Security Associates (ACSA), Silver Spring, MD.
-
(2002)
Proceedings of 18th Annual Computer Security Applications Conference
-
-
GASSEND, B.1
CLARKE, D.2
VAN DIJK, M.3
DEVADAS, S.4
-
10
-
-
0038341105
-
Silicon physical random functions
-
ACM, New York
-
GASSEND, B., CLARKE, D., VAN DIJK, M., AND DEVADAS, S. 2002b. Silicon physical random functions. In Proceedings of the Computer and Communication Security Conference. ACM, New York.
-
(2002)
Proceedings of the Computer and Communication Security Conference
-
-
GASSEND, B.1
CLARKE, D.2
VAN DIJK, M.3
DEVADAS, S.4
-
11
-
-
84955507265
-
Caches and Merkle trees for efficient memory integrity verification
-
IEEE, New York
-
GASSEND, B., SUH, G. E., CLARKE, D., VAN DIJK, M., AND DEVADAS, S. 2003. Caches and Merkle trees for efficient memory integrity verification. In Proceedings of Ninth International Symposium on High Performance Computer Architecture. IEEE, New York.
-
(2003)
Proceedings of Ninth International Symposium on High Performance Computer Architecture
-
-
GASSEND, B.1
SUH, G.E.2
CLARKE, D.3
VAN DIJK, M.4
DEVADAS, S.5
-
12
-
-
4344587804
-
Identification and authentication of integrated circuits
-
GASSEND, B., LIM, D., CLARKE, D., VAN DIJK, M., AND DEVADAS, S. 2004. Identification and authentication of integrated circuits. Concurrency and Computation: Practice and Experience 16, 11, 1077-1098.
-
(2004)
Concurrency and Computation: Practice and Experience
, vol.16
, Issue.11
, pp. 1077-1098
-
-
GASSEND, B.1
LIM, D.2
CLARKE, D.3
VAN DIJK, M.4
DEVADAS, S.5
-
13
-
-
0004610703
-
Secure deletion of data from magnetic and solid-state memory
-
Usenix Association, Berkeley, CA
-
GUTMAN, P. 1996. Secure deletion of data from magnetic and solid-state memory. In Sixth USENIX Security Symposium Proceedings. Usenix Association, Berkeley, CA, 77-89.
-
(1996)
Sixth USENIX Security Symposium Proceedings
, pp. 77-89
-
-
GUTMAN, P.1
-
15
-
-
0038507387
-
Alloy: A lightweight object modelling notation
-
JACKSON, D. 2002. Alloy: A lightweight object modelling notation. ACM TOSEM 11, 2, 256-290.
-
(2002)
ACM TOSEM
, vol.11
, Issue.2
, pp. 256-290
-
-
JACKSON, D.1
-
16
-
-
84939573910
-
Differential power analysis
-
KOCHER, P., JAFFE, J., AND JUN, B. 1999. Differential power analysis. Lecture Notes in Computer Science 1666, 388-397.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
KOCHER, P.1
JAFFE, J.2
JUN, B.3
-
17
-
-
4544381402
-
A technique to build a secret key in integrated circuits with identification and authentication applications
-
IEEE, New York
-
LEE, J.-W., LIM, D., GASSEND, B., SUH, G. E., VAN DIJK, M., AND DEVADAS, S. 2004. A technique to build a secret key in integrated circuits with identification and authentication applications. In Proceedings of the IEEE VLSI Circuits Symposium,. IEEE, New York.
-
(2004)
Proceedings of the IEEE VLSI Circuits Symposium
-
-
LEE, J.-W.1
LIM, D.2
GASSEND, B.3
SUH, G.E.4
VAN DIJK, M.5
DEVADAS, S.6
-
19
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
LIE, D., THEKKATH, C., MITCHELL, M., LINCOLN, P., BONEH, D., MITCHELL, J., AND HOROWITZ, M. 2000. Architectural support for copy and tamper resistant software. In Proceedings of the 9th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX). 168-177.
-
(2000)
Proceedings of the 9th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)
, pp. 168-177
-
-
LIE, D.1
THEKKATH, C.2
MITCHELL, M.3
LINCOLN, P.4
BONEH, D.5
MITCHELL, J.6
HOROWITZ, M.7
-
21
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
LIM, D., LEE, J. W., GASSEND, B., SUH, G. E., VAN DIJK, M., AND DEVADAS, S. 2005. Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13, 10, 1200-1205.
-
(2005)
IEEE Trans. VLSI Syst
, vol.13
, Issue.10
, pp. 1200-1205
-
-
LIM, D.1
LEE, J.W.2
GASSEND, B.3
SUH, G.E.4
VAN DIJK, M.5
DEVADAS, S.6
-
22
-
-
39149127481
-
-
MICROSOFT. Next-Generation Secure Computing Base, http://www.microsoft.com/resources/ngscb/defaul.mspx.
-
MICROSOFT. Next-Generation Secure Computing Base, http://www.microsoft.com/resources/ngscb/defaul.mspx.
-
-
-
-
23
-
-
0037952426
-
-
Ph.D. thesis, Massachusetts Institute of Technology
-
RAVIKANTH, R S. 2001. Physical one-way functions. Ph.D. thesis, Massachusetts Institute of Technology.
-
(2001)
Physical one-way functions
-
-
RAVIKANTH, R.S.1
-
24
-
-
0037144430
-
Physical One-Way Functions
-
RAVIKANTH, P. S., RECHT, B., TAYLOR, J., AND GERSHENFELD, N. 2002. Physical One-Way Functions. Science 297, 2026-2030.
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
RAVIKANTH, P.S.1
RECHT, B.2
TAYLOR, J.3
GERSHENFELD, N.4
-
25
-
-
39149104891
-
-
SETI@HOME
-
SETI@HOME.
-
-
-
-
26
-
-
26444544536
-
Robust key extraction from physical unclonable functions
-
Proceedings of the Applied Cryptography and Network Security Conference 2005, J. Ionnidis, A. Keromytis, and M. Yung, Eds, Springer-Verlag. New York
-
SKORIC, B., TUYLS, P., AND OPHEY, W 2005. Robust key extraction from physical unclonable functions. In Proceedings of the Applied Cryptography and Network Security Conference 2005, J. Ionnidis, A. Keromytis, and M. Yung, Eds. Lecture Notes in Computer Science, vol. 3531. Springer-Verlag. New York. 407-422.
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 407-422
-
-
SKORIC, B.1
TUYLS, P.2
OPHEY, W.3
-
27
-
-
0033293553
-
-
SMITH, S. W AND WEINGART, S. H. 1999. Building a high-performance, programmable secure coprocessor. Computer Networks (Special Issue on Computer Network Security) 31, 8 (Apr.), 831-860.
-
SMITH, S. W AND WEINGART, S. H. 1999. Building a high-performance, programmable secure coprocessor. Computer Networks (Special Issue on Computer Network Security) 31, 8 (Apr.), 831-860.
-
-
-
-
28
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
ACM, New York
-
SUH, G. E., CLARKE, D., GASSEND, B., VAN DIJK, M., AND DEVADAS, S. 2003. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th Int'l Conference on Supercomputing (MIT-CSAIL-CSG-Memo-474 is an updated version). ACM, New York.
-
(2003)
Proceedings of the 17th Int'l Conference on Supercomputing (MIT-CSAIL-CSG-Memo-474 is an updated version)
-
-
SUH, G.E.1
CLARKE, D.2
GASSEND, B.3
VAN DIJK, M.4
DEVADAS, S.5
-
29
-
-
27544441530
-
Design and implementation of the AEGIS single-chip secure processor using physical random functions
-
available at, ACM, New York
-
SUH, G. E., O'DONNELL, C. W., SACHDEV, I., AND DEVADAS, S. 2005. Design and implementation of the AEGIS single-chip secure processor using physical random functions. In Proceedings of the 32nd Annual International Symposium on Computer Architecture (MIT-CSAIL-CSG-Memo-483 is an updated version available at http://csg.csail.mit. edu/pubs/memos/Memo-483/Memo-483.pdf). ACM, New York.
-
(2005)
Proceedings of the 32nd Annual International Symposium on Computer Architecture (MIT-CSAIL-CSG-Memo-483 is an updated version
-
-
SUH, G.E.1
O'DONNELL, C.W.2
SACHDEV, I.3
DEVADAS, S.4
-
30
-
-
39149143550
-
-
TORLAK, E., VAN DIJK, M., GASSEND, B., JACKSON, D., AND DEVADAS, S. 2006. Knowledge flow analysis for security protocols. http://arxiv.org/abs/cs/0605109.
-
(2006)
Knowledge flow analysis for security protocols
-
-
TORLAK, E.1
VAN DIJK, M.2
GASSEND, B.3
JACKSON, D.4
DEVADAS, S.5
-
31
-
-
21644486314
-
-
TRUSTED COMPUTING GROUP, Revision 1.2
-
TRUSTED COMPUTING GROUP. 2004. TCG Specification Architecture Overview Revision 1.2. http://www. trustedcomputinggroup.com/home.
-
(2004)
TCG Specification Architecture Overview
-
-
-
32
-
-
26444487655
-
Information theoretical security analysis of physical unclonable functions
-
Proceedings Conf on Financial Cryptography and Data Security 2005, A. Patrick and M. Yung, Eds, Springer-Verlag, New York
-
TUYLS, P., SKORIC, B., STALLINGA, S., AKKERMANS, A., AND OPHEY, W. 2005. Information theoretical security analysis of physical unclonable functions. In Proceedings Conf on Financial Cryptography and Data Security 2005, A. Patrick and M. Yung, Eds. Lecture Notes in Computer Science, vol. 3570. Springer-Verlag, New York. 141-155.
-
(2005)
Lecture Notes in Computer Science
, vol.3570
, pp. 141-155
-
-
TUYLS, P.1
SKORIC, B.2
STALLINGA, S.3
AKKERMANS, A.4
OPHEY, W.5
-
34
-
-
0004196480
-
-
Ph.D. thesis, Carnegie Mellon University
-
YEE, B. S. 1994. Using secure coprocessors. Ph.D. thesis, Carnegie Mellon University.
-
(1994)
Using secure coprocessors
-
-
YEE, B.S.1
|