-
1
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
June
-
R. Lee, P. Kwan, J. P. McGregor, J. Dwoskin, Z. Wang. "Architecture for Protecting Critical Secrets in Microprocessors, " Proceedings of the 32nd International Symposium on Computer Architecture (ISCA 2005), pp. 2-13, June 2005.
-
(2005)
Proceedings of the 32nd International Symposium on Computer Architecture (ISCA 2005)
, pp. 2-13
-
-
Lee, R.1
Kwan, P.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
2
-
-
77952384560
-
Pre-shared key ciphersuites for transport layer security (TLS)
-
IETF Network Working Group, ", "
-
IETF Network Working Group. "Pre-Shared Key Ciphersuites for Transport Layer Security (TLS), " Request for Comments: 4279. http://www.ietf.org/rfc/rfc4279.txt
-
Request for Comments: 4279
-
-
-
4
-
-
71749121044
-
-
Trusted Computing Group, ", ", April
-
Trusted Computing Group. "Trusted Platform Module (TPM) Specifications, " April 2006. https://www.trustedcomputinggroup.org/specs/ TPM
-
(2006)
Trusted Platform Module (TPM) Specifications
-
-
-
5
-
-
84965066515
-
Advanced encryption standard
-
National Institute of Standards and Technology, ", ", FIPS Pub 197, Nov
-
National Institute of Standards and Technology, "Advanced Encryption Standard, " Federal Information Processing Standards Publication, FIPS Pub 197, Nov. 2001.
-
(2001)
Federal Information Processing Standards Publication
-
-
-
7
-
-
61349130443
-
The keyed-hash message authentication code (HMAC)
-
National Institute of Standards and Technology, ", ", FIPS Pub 198
-
National Institute of Standards and Technology. "The Keyed-Hash Message Authentication Code (HMAC), " Federal Information Processing Standards Publication, FIPS Pub 198. http://csrc.nist.gov/publications/fips/ fips198/fips-198apdf
-
Federal Information Processing Standards Publication
-
-
-
9
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. "Architectural Support for Copy and Tamper Resistant Software, " Proc. of the 9th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)., pp. 168-177, 2000.
-
(2000)
Proc. of the 9th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX).
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
10
-
-
1142280988
-
Aegis: Architecture for tamper-evident and tamper-resistant processing
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. "AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing, " Proc. of the 17th Int'l Conf. on Supercomputing (ICS), 2003.
-
(2003)
Proc. of the 17th Int'l Conf. on Supercomputing (ICS)
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
11
-
-
0018995481
-
Preventing software piracy with crypto-microprocessors
-
R. M. Best, "Preventing Software Piracy with Crypto-Microprocessors, " Proc. of IEEE Spring COMPCON Š80, pp. 466-469, 1980.
-
(1980)
Proc. of IEEE Spring COMPCON Š80
, pp. 466-469
-
-
Best, R.M.1
|