-
1
-
-
34548301407
-
Energy and execution time analysis of a software-based trusted platform module
-
ACM Press, Apr
-
N. Aaraj, A. Raghunathan, S. Ravi, and N. K. Jha. Energy and execution time analysis of a software-based trusted platform module. In Proceedings of the 10th Conference on Design, Automation and Test in Europe (DATE 2007), pp. 1128-1133. ACM Press, Apr. 2007.
-
(2007)
Proceedings of the 10th Conference on Design, Automation and Test in Europe (DATE 2007)
, pp. 1128-1133
-
-
Aaraj, N.1
Raghunathan, A.2
Ravi, S.3
Jha, N.K.4
-
2
-
-
51849104627
-
TrustZone: Integrated hardware and software security (enabling trusted computing in embedded systems)
-
Dec
-
T. Alves and D. Felton. TrustZone: Integrated hardware and software security (enabling trusted computing in embedded systems). Information Quarterly, 3(4):18-24, Dec. 2004.
-
(2004)
Information Quarterly
, vol.3
, Issue.4
, pp. 18-24
-
-
Alves, T.1
Felton, D.2
-
4
-
-
51849102889
-
Architectural enhancements for secure embedded processing
-
Security and Embedded Systems, of, IOS Press
-
D. Arora, S. Ravi, A. Raghunathan, and N. K. Jha. Architectural enhancements for secure embedded processing. In Security and Embedded Systems, vol. 2 of NATO Security through Science Series, pp. 18-25. IOS Press, 2006.
-
(2006)
NATO Security through Science Series
, vol.2
, pp. 18-25
-
-
Arora, D.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
5
-
-
79959557051
-
Reconfigurable trusted computing in hardware
-
ACM Press
-
T. Eisenbarth, T. Güneysu, C. Paar, A.-R. Sadeghi, D. Schellekens, and M. Wolf. Reconfigurable trusted computing in hardware. In Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing (STC 2007), pp. 15-20. ACM Press, 2007.
-
(2007)
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing (STC 2007)
, pp. 15-20
-
-
Eisenbarth, T.1
Güneysu, T.2
Paar, C.3
Sadeghi, A.-R.4
Schellekens, D.5
Wolf, M.6
-
6
-
-
51849128784
-
Mobile Trusted Module (MTM) - An Introduction
-
Technical report NRC-TR-2007-015, Nokia Research Center, Finland. Available for download at
-
J.-E. Ekberg and M. Kyläanpää. Mobile Trusted Module (MTM) - An Introduction. Technical report NRC-TR-2007-015, Nokia Research Center, Finland. Available for download at http://research.nokia.com/files/NRCTR2007015. pdf, 2007.
-
(2007)
-
-
Ekberg, J.-E.1
Kyläanpää, M.2
-
7
-
-
38149113740
-
Cryptography instruction set extensions to the SPARC V8 architecture. Preprint
-
submitted for publication
-
J. Großschädl, S. Tillich, A. Szekely, and M. Wurm. Cryptography instruction set extensions to the SPARC V8 architecture. Preprint, submitted for publication.
-
-
-
Großschädl, J.1
Tillich, S.2
Szekely, A.3
Wurm, M.4
-
8
-
-
51849124652
-
TrustZone security extensions strengthen ARMv6 architecture
-
17(34):20-23, Aug. 2003
-
T. R. Halfhill. ARM dons armor: TrustZone security extensions strengthen ARMv6 architecture. Microprocessor Report, 17(34):20-23, Aug. 2003.
-
Microprocessor Report
-
-
Halfhill, T.R.1
dons armor, A.R.M.2
-
9
-
-
51849145112
-
IBM offers chip-level security: SecureBlue technology aims to make security ubiquitous in SoCs
-
2019, 1-4, May 2006
-
T. R. Halfhill. IBM offers chip-level security: SecureBlue technology aims to make security ubiquitous in SoCs. Microprocessor Report, 20(19): 1-4, May 2006.
-
Microprocessor Report
-
-
Halfhill, T.R.1
-
11
-
-
21644488432
-
Interfacing a high speed crypto accelerator to an embedded CPU
-
IEEE, Nov
-
A. Hodjat and I. Verbauwhede. Interfacing a high speed crypto accelerator to an embedded CPU. In Proceedings of the 38th Asilomar Conference on Signals, Systems, and Computers (ACSSC 2004), vol. 1, pp. 488-492. IEEE, Nov. 2004.
-
(2004)
Proceedings of the 38th Asilomar Conference on Signals, Systems, and Computers (ACSSC 2004)
, vol.1
, pp. 488-492
-
-
Hodjat, A.1
Verbauwhede, I.2
-
13
-
-
33646430870
-
Securing embedded systems
-
Mar./Apr
-
D. D. Hwang, P. Schaumont, K. Tiri, and I. Verbauwhede. Securing embedded systems. IEEE Security and Privacy Magazine, 4(2):40-49, Mar./Apr. 2006.
-
(2006)
IEEE Security and Privacy Magazine
, vol.4
, Issue.2
, pp. 40-49
-
-
Hwang, D.D.1
Schaumont, P.2
Tiri, K.3
Verbauwhede, I.4
-
14
-
-
51849124183
-
-
IBM, Intel Corporation, and NTT DoCoMo. Trusted Mobile Platform: Hardware Architecture Description (Revision 1.0). Specification, available for download at http://www.trusted-mobile.org/TMP_HWAD_rev1_00.pdf, Oct. 2004.
-
IBM, Intel Corporation, and NTT DoCoMo. Trusted Mobile Platform: Hardware Architecture Description (Revision 1.0). Specification, available for download at http://www.trusted-mobile.org/TMP_HWAD_rev1_00.pdf, Oct. 2004.
-
-
-
-
16
-
-
33751547821
-
ChipLock: Support for secure microarchitectures
-
Mar
-
T. Kgil, L. Falk, and T. N. Mudge. ChipLock: Support for secure microarchitectures. SIGARCH Computer Architecture News, 33(1): 134-143, Mar. 2005.
-
(2005)
SIGARCH Computer Architecture News
, vol.33
, Issue.1
, pp. 134-143
-
-
Kgil, T.1
Falk, L.2
Mudge, T.N.3
-
17
-
-
4444331720
-
Security as a new dimension in embedded system design
-
ACM Press, June
-
P. C. Kocher, R. B. Lee, G. E. McGraw, A. Raghunathan, and S. Ravi. Security as a new dimension in embedded system design. In Proceedings of the 41st Design Automation Conference (DAC 2004), pp. 753-760. ACM Press, June 2004.
-
(2004)
Proceedings of the 41st Design Automation Conference (DAC 2004)
, pp. 753-760
-
-
Kocher, P.C.1
Lee, R.B.2
McGraw, G.E.3
Raghunathan, A.4
Ravi, S.5
-
18
-
-
3242756924
-
Embedded system security
-
July
-
P. Koopman. Embedded system security. Computer, 37(7):95-97, July 2004.
-
(2004)
Computer
, vol.37
, Issue.7
, pp. 95-97
-
-
Koopman, P.1
-
19
-
-
54249097318
-
Analyzing trusted platform communication
-
Leuven, Belgium, Sept
-
K. Kursawe, D. Schellekens, and B. Preneel. Analyzing trusted platform communication. In Proceedings of the 1st ECRYPT Workshop on Cryptographic Advances in Secure Hardware (CRASH 2005), Leuven, Belgium, Sept. 2005.
-
(2005)
Proceedings of the 1st ECRYPT Workshop on Cryptographic Advances in Secure Hardware (CRASH 2005)
-
-
Kursawe, K.1
Schellekens, D.2
Preneel, B.3
-
20
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
IEEE Computer Society Press, June
-
R. B. Lee, C.-S. Kwan, J. P. McGregor, J. S. Dwoskin, and Z.-H. Wang. Architecture for protecting critical secrets in microprocessors. In Proceedings of the 32nd Annual International Symposium on Computer Architecture (ISCA 2005), pp. 2-13. IEEE Computer Society Press, June 2005.
-
(2005)
Proceedings of the 32nd Annual International Symposium on Computer Architecture (ISCA 2005)
, pp. 2-13
-
-
Lee, R.B.1
Kwan, C.-S.2
McGregor, J.P.3
Dwoskin, J.S.4
Wang, Z.-H.5
-
22
-
-
51849143321
-
Designing for security - Why software isn't enough
-
Mar
-
G. Powell. Designing for security - Why software isn't enough. Information Quarterly, 5(1):14-18, Mar. 2006.
-
(2006)
Information Quarterly
, vol.5
, Issue.1
, pp. 14-18
-
-
Powell, G.1
-
23
-
-
10444228259
-
Securing mobile appliances: New challenges for the system designer
-
IEEE Computer Society Press, Mar
-
A. Raghunathan, S. Ravi, S. Hattangady, and J.-J. Quisquater. Securing mobile appliances: New challenges for the system designer. In Proceedings of the 6th Conference on Design, Automation and Test in Europe (DATE 2003), pp. 176-181. IEEE Computer Society Press, Mar. 2003.
-
(2003)
Proceedings of the 6th Conference on Design, Automation and Test in Europe (DATE 2003)
, pp. 176-181
-
-
Raghunathan, A.1
Ravi, S.2
Hattangady, S.3
Quisquater, J.-J.4
-
24
-
-
2342652200
-
Tamper resistance mechanisms for secure embedded systems
-
PP, IEEE Computer Society Press, Jan
-
S. Ravi, A. Raghunathan, and S. Chakradhar. Tamper resistance mechanisms for secure embedded systems. In Proceedings of the 17th International Conference on VLSI Design (VLSID 2004), PP. 605-611. IEEE Computer Society Press, Jan. 2004.
-
(2004)
Proceedings of the 17th International Conference on VLSI Design (VLSID 2004)
, pp. 605-611
-
-
Ravi, S.1
Raghunathan, A.2
Chakradhar, S.3
-
26
-
-
51849091963
-
TPM virtualization: Building a general framework
-
Vieweg
-
V. Scarlata, C. Rozas, M. Wiseman, D. Grawrock, and C. Vishik. TPM virtualization: Building a general framework. In Trusted Computing, pp. 43-56. Vieweg, 2008.
-
(2008)
Trusted Computing
, pp. 43-56
-
-
Scarlata, V.1
Rozas, C.2
Wiseman, M.3
Grawrock, D.4
Vishik, C.5
-
27
-
-
12444272661
-
Embedded software integration for coarse-grain reconfigurable systems
-
PP, IEEE Computer Society Press
-
P. Schaumont, K. Sakiyama, A. Hodjat, and I. Verbauwhede. Embedded software integration for coarse-grain reconfigurable systems. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), PP. 137-142, IEEE Computer Society Press, 2004.
-
(2004)
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004)
, pp. 137-142
-
-
Schaumont, P.1
Sakiyama, K.2
Hodjat, A.3
Verbauwhede, I.4
-
29
-
-
51849089217
-
-
J. Srage and J. Azema. M-Shield™ Mobile Security Technology -Making Wireless Secure. White paper, available for dowload at http://focus.ti.com/ pdfs/wtbu/ti_mshield_whitepaper.pdf, July 2005.
-
J. Srage and J. Azema. M-Shield™ Mobile Security Technology -Making Wireless Secure. White paper, available for dowload at http://focus.ti.com/ pdfs/wtbu/ti_mshield_whitepaper.pdf, July 2005.
-
-
-
-
30
-
-
33845221062
-
-
Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA
-
G. E. Suh. AEGIS: A Single-Chip Secure Processor. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2005.
-
(2005)
AEGIS: A Single-Chip Secure Processor
-
-
Suh, G.E.1
-
31
-
-
33750697230
-
Instruction set extensions for efficient AES implementation on 32-bit processors
-
Cryptographic Hardware and Embedded Systems, CHES 2006, of, Springer Verlag
-
S. Tillich and J. Großschädl. Instruction set extensions for efficient AES implementation on 32-bit processors. In Cryptographic Hardware and Embedded Systems - CHES 2006, vol. 4249 of Lecture Notes in Computer Science, pp. 270-284. Springer Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4249
, pp. 270-284
-
-
Tillich, S.1
Großschädl, J.2
-
32
-
-
84893560866
-
-
Trusted Computing Group, Revision 1.2, Available for download at, Apr. 2004
-
Trusted Computing Group. TCG Specification Architecture Overview (Revision 1.2). Available for download at https://www.trustedcomputinggroup.org/ groups/TCG_1_0_Architecture_Overview.pdf, Apr. 2004.
-
TCG Specification Architecture Overview
-
-
-
33
-
-
51849083861
-
-
Trusted Computing Group. TCG Trusted Platform Module Specification (Version 1.2). Available for download at https://www.trustedcomputinggroup.org/ specs/TPM/, July 2007.
-
Trusted Computing Group. TCG Trusted Platform Module Specification (Version 1.2). Available for download at https://www.trustedcomputinggroup.org/ specs/TPM/, July 2007.
-
-
-
-
34
-
-
51849115546
-
-
Trusted Computing Group, Mobile Phone Work Group. Use Case Scenarios Version 2.7, Available for download at, Sept. 2005
-
Trusted Computing Group, Mobile Phone Work Group. Use Case Scenarios (Version 2.7). Available for download at https://www.trustedcomputinggroup.org/ groups/mobile/MPWG_Use_Cases.pdf, Sept. 2005.
-
-
-
-
35
-
-
51849167740
-
-
Trusted Computing Group. TCG Mobile Trusted Module Specification (Version 1.0, Revision 1). Available for download at https://www.trustedcomputinggroup. org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf, June 2007.
-
Trusted Computing Group. TCG Mobile Trusted Module Specification (Version 1.0, Revision 1). Available for download at https://www.trustedcomputinggroup. org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf, June 2007.
-
-
-
-
36
-
-
51849144218
-
-
Trusted Computing Group, Available for download at, 2007
-
Trusted Computing Group. Mobile Trusted Module Specification FAQ. Available for download at https: //www.trustedcomputinggroup.org/specs/ mobilephone/MTM_Specification_Technical_FAQ_062007.pdf, 2007.
-
Mobile Trusted Module Specification FAQ
-
-
-
37
-
-
47349084831
-
Trusted computing - A new challenge for embedded systems
-
IEEE, Dec
-
R. Vaslin, G. Gogniat, J.-P. Diguet, and A. Pegatoquet. Trusted computing - A new challenge for embedded systems. In Proceedings of the 13th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2006), pp. 776-779. IEEE, Dec. 2006.
-
(2006)
Proceedings of the 13th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2006)
, pp. 776-779
-
-
Vaslin, R.1
Gogniat, G.2
Diguet, J.-P.3
Pegatoquet, A.4
-
38
-
-
33745171465
-
-
X. Wang, Y. L. Yin and H. Yu. Finding collisions in the full SHA-1. In Advances in Cryptology -CRYPTO 2005, 3621 of Lecture Notes in Computer Science, pp. 17-36. Springer Verlag, 2005.
-
X. Wang, Y. L. Yin and H. Yu. Finding collisions in the full SHA-1. In Advances in Cryptology -CRYPTO 2005, vol. 3621 of Lecture Notes in Computer Science, pp. 17-36. Springer Verlag, 2005.
-
-
-
|