-
6
-
-
84957355967
-
On the Importance of Checking Cryptgraphic Protocols for Faults
-
Boneh, Demillo, and Lipton. On the Importance of Checking Cryptgraphic Protocols for Faults. In Proceedings of Advances in Cryptology-Eurocrypt, pages 37-51, 1997.
-
(1997)
Proceedings of Advances in Cryptology-Eurocrypt
, pp. 37-51
-
-
Boneh, D.1
Lipton2
-
8
-
-
70149090236
-
-
I. Buck. BrookGPU. http://graphics.stanford.edu/projects/brookgpu/index.html, 2003.
-
(2003)
BrookGPU
-
-
Buck, I.1
-
9
-
-
84882716199
-
Spy ware and Rootkits-The Future Convergence
-
December
-
J. Butler and S. Sparks. Spy ware and Rootkits-The Future Convergence. USENIX;login:, 29(6):8-15, December 2004.
-
(2004)
USENIX;login
, vol.29
, Issue.6
, pp. 8-15
-
-
Butler, J.1
Sparks, S.2
-
11
-
-
18844373581
-
-
White paper, Microsoft, August
-
A. Carroll, M. Juarez, J. Polk, and T. Leininger. Microsoft Palladium: A Business Overview. White paper, Microsoft, August 2002.
-
(2002)
Microsoft Palladium: A Business Overview
-
-
Carroll, A.1
Juarez, M.2
Polk, J.3
Leininger, T.4
-
16
-
-
33646729274
-
Remotely Keyed Cryptographies-Secure Remote Display Access Using (Mostly) Untrusted Hardware
-
In, December
-
D. Cook, R. Baretto, and A. Keromytis. Remotely Keyed Cryptographies-Secure Remote Display Access Using (Mostly) Untrusted Hardware. In Proceedings of ICICS, pages 363-375, December 2005.
-
(2005)
Proceedings of ICICS
, pp. 363-375
-
-
Cook, D.1
Baretto, R.2
Keromytis, A.3
-
17
-
-
24144454572
-
Crypto Graphics: Secret Key Cryptography Using Graphics Cards
-
In, February
-
D. Cook, J. loannidis, A. Keromytis, and J. Luck. Crypto Graphics: Secret Key Cryptography Using Graphics Cards. In Proceedings of the RSA Conference, Cryptographer's Track (CT-RSA), pages 334-350, February 2005.
-
(2005)
Proceedings of the RSA Conference, Cryptographer's Track (CT-RSA)
, pp. 334-350
-
-
Cook, D.1
Loannidis, J.2
Keromytis, A.3
Luck, J.4
-
22
-
-
84942212197
-
Network subsystem design
-
July
-
P. Druschel, M. Abbott, M. Pagels, and L. Peterson. Network subsystem design. IEEE Network, 7(4):8-17, July 1993.
-
(1993)
IEEE Network
, vol.7
, Issue.4
, pp. 8-17
-
-
Druschel, P.1
Abbott, M.2
Pagels, M.3
Peterson, L.4
-
24
-
-
0142213065
-
Security: Adding Protection to the Network via the Network Processor
-
6, August
-
W. Feghali, B. Burres, G. Wolrich, and D. Carrigan. Security: Adding Protection to the Network via the Network Processor. Intel Technology Journal, 6, August 2002.
-
(2002)
Intel Technology Journal
-
-
Feghali, W.1
Burres, B.2
Wolrich, G.3
Carrigan, D.4
-
28
-
-
85180529073
-
Speeding up Secure Web Transactions Using Elliptic Curve Cryptography
-
In, February
-
V. Gupta, D. Stebila, S. Fung, S. C. Shantz, N. Gura, and H. Eberle. Speeding up Secure Web Transactions Using Elliptic Curve Cryptography. In Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS), pages 231-239, February 2004.
-
(2004)
Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS)
, pp. 231-239
-
-
Gupta, V.1
Stebila, D.2
Fung, S.3
Shantz, S.C.4
Gura, N.5
Eberle, H.6
-
32
-
-
33645588714
-
-
Helion Technology Limited, AES (Rijndael) Core
-
Helion Technology Limited. High Performance Solutions in Silicon, AES (Rijndael) Core, http://www.heliontech.com/core2.htm, 2003.
-
(2003)
High Performance Solutions in Silicon
-
-
-
33
-
-
0041973497
-
Paclcet Leashes: A Defense against Wormhole Attacks in Wireless Networks
-
In, April
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Paclcet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In Proceedings of IEEE Infocomm, April 2003.
-
(2003)
Proceedings of IEEE Infocomm
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
35
-
-
84974760753
-
The Importance of Non-Data Touching Processing Overheads in TCP/IP
-
In, September
-
J. Kay and J. Pasquale. The Importance of Non-Data Touching Processing Overheads in TCP/IP. In Proceedings ACM SIGCOMM Conference, pages 259-269, September 1993.
-
(1993)
Proceedings ACM SIGCOMM Conference
, pp. 259-269
-
-
Kay, J.1
Pasquale, J.2
-
36
-
-
0033705991
-
Side Channel Cryptanalysis of Product Ciphers
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall. Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security, 8(2-3):141-158, 2000.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.2-3
, pp. 141-158
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
40
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems
-
P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In Proceedings of Advances in Cryptology-Crypto, pages 104-113, 1996.
-
(1996)
Proceedings of Advances in Cryptology-Crypto
, pp. 104-113
-
-
Kocher, P.1
-
41
-
-
12844288855
-
Protected Interactive 3D Graphics Via Remote Rendering
-
D. Koller, M. Turitzin, M. Levoy, M. Tarini, G. Croccia, P. Cignoni, and R. Scopigno. Protected Interactive 3D Graphics Via Remote Rendering. In Proceedings of ACM SIGGRAPH, 2004.
-
(2004)
Proceedings of ACM SIGGRAPH
-
-
Koller, D.1
Turitzin, M.2
Levoy, M.3
Tarini, M.4
Croccia, G.5
Cignoni, P.6
Scopigno, R.7
-
42
-
-
35248861095
-
Architectual Optimization for 1.82 Gbits/sec VLSI Implementation of Rijndael Algorithm
-
H. Kuo and I. Verbauwhede. Architectual Optimization for 1.82 Gbits/sec VLSI Implementation of Rijndael Algorithm. In Proceedings of CHES, pages 51-64, 2001.
-
(2001)
Proceedings of CHES
, pp. 51-64
-
-
Kuo, H.1
Verbauwhede, I.2
-
43
-
-
85011105685
-
A Proposal for a New Block Encryption Standard
-
X. Lai and J. Massey. A Proposal for a New Block Encryption Standard. In Proceedings of EUROCRYPT1990, pages 389-404, 1991.
-
(1991)
Proceedings of EUROCRYPT1990
, pp. 389-404
-
-
Lai, X.1
Massey, J.2
-
44
-
-
10944240574
-
Interface Illusions
-
November/December
-
E. Levy. Interface Illusions. IEEE Security & Privacy, 2(6):66-69, November/December 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.6
, pp. 66-69
-
-
Levy, E.1
-
45
-
-
35248815417
-
2G bits/s Hardware Realizations of Rijndael and Serpent: A Comparative Analysis
-
A. Lutz, J. Treichler, F. Gurkeynak, H. Kaeslin, G. Bosler, A. Erni, S. Reichmuth, P. Rommens, S. Oetiker, and W. Fichtner. 2G bits/s Hardware Realizations of Rijndael and Serpent: A Comparative Analysis. In Proceedings of CHES, pages 144-158, 2002.
-
(2002)
Proceedings of CHES
, pp. 144-158
-
-
Lutz, A.1
Treichler, J.2
Gurkeynak, F.3
Kaeslin, H.4
Bosler, G.5
Erni, A.6
Reichmuth, S.7
Rommens, P.8
Oetiker, S.9
Fichtner, W.10
-
47
-
-
0142103318
-
The GPU Enters Computing's Mainstream
-
October
-
M. Macedonia. The GPU Enters Computing's Mainstream. IEEE Computer Magazine, pages 106-108, October 2003.
-
(2003)
IEEE Computer Magazine
, pp. 106-108
-
-
Macedonia, M.1
-
50
-
-
84944878412
-
High Performance Single Chip FPGA Rijndael Algorithms Implementations
-
M. McLoone and J. McConny. High Performance Single Chip FPGA Rijndael Algorithms Implementations. In Proceedings of CHES, pages 65-76, 2001.
-
(2001)
Proceedings of CHES
, pp. 65-76
-
-
McLoone, M.1
McConny, J.2
-
51
-
-
15944399510
-
-
Microsoft
-
Microsoft. Microsoft DirectX, http://www.microsoft.com/windows/directx/d e f a u l t. a s p x.
-
Microsoft DirectX
-
-
-
53
-
-
85084162744
-
A Study of the Relative Costs of Network Security Protocols
-
In, June
-
S. Miltchev, S. loannidis, and A. D. Keromytis. A Study of the Relative Costs of Network Security Protocols. In Proceedings of USENIX Annual Technical Conference, Freenix Track, pages 41-48, June 2002.
-
(2002)
Proceedings of USENIX Annual Technical Conference, Freenix Track
, pp. 41-48
-
-
Miltchev, S.1
Loannidis, S.2
Keromytis, A.D.3
-
54
-
-
2442545605
-
Measuring Thin-Client Performance Using Slow-Motion Benchmarking
-
Feb
-
J. Nieh, S. J. Yang, and N. Novik. Measuring Thin-Client Performance Using Slow-Motion Benchmarking. ACM Transactions on Computer Systems (TOCS), 21(1):87-115, Feb. 2003.
-
(2003)
ACM Transactions on Computer Systems (TOCS)
, vol.21
, Issue.1
, pp. 87-115
-
-
Nieh, J.1
Yang, S.J.2
Novik, N.3
-
58
-
-
84882700565
-
-
OpenGL Organization
-
OpenGL Organization. OpenGL. h t t p://www. opengl. org, 2005.
-
(2005)
OpenGL
-
-
-
62
-
-
58249143610
-
-
editor., Addison-Wesley
-
M. Pharr, editor. GPU Gems2. Addison-Wesley, 2005.
-
(2005)
GPU Gems2
-
-
Pharr, M.1
-
63
-
-
0002004087
-
The Synthesis System
-
C. Pu, H. Massalin, J. loannidis, and P. Metzger. The Synthesis System. Computing Systems, 1(1), 1988.
-
(1988)
Computing Systems
, vol.1
, Issue.1
-
-
Pu, C.1
Massalin, H.2
Loannidis, J.3
Metzger, P.4
-
64
-
-
0005097206
-
Digital Rights Management (DRM) Architectures
-
June
-
R. lannella. Digital Rights Management (DRM) Architectures. D-Lib Magazine, 1(6), June 2001.
-
(2001)
D-Lib Magazine
, vol.1
, Issue.6
-
-
Lannella, R.1
-
66
-
-
0004102023
-
-
Rivest, Robshaw, Sidney, and Yin
-
Rivest, Robshaw, Sidney, and Yin. RC6 Block Cipher, http://www.rsasecurity. com/rsalabs/node.asp?id=2512, 1998.
-
(1998)
RC6 Block Cipher
-
-
-
67
-
-
4143075680
-
The RC5 Encryption Algorithm
-
R. Rivest. The RC5 Encryption Algorithm. CryptoBytes, 1(1), 1995.
-
(1995)
CryptoBytes
, vol.1
, Issue.1
-
-
Rivest, R.1
-
68
-
-
84956864062
-
A Stream Cipher Based on Linear Feedback Over GF (28)
-
G. Rose. A Stream Cipher Based on Linear Feedback Over GF (28). In Information Security and Privacy LNCS 1438, page 135ff, 1998.
-
(1998)
Information Security and Privacy LNCS 1438
, pp. 135
-
-
Rose, G.1
-
74
-
-
0041350435
-
The Interactive Performance of SLIM: A Stateless, Thin-Client Architecture
-
In, Kiawah Island Resort, SC, December
-
th ACM Symposium on Operating Systems Principles (SOSP), pages 32-47, Kiawah Island Resort, SC, December 1999.
-
(1999)
th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 32-47
-
-
Schmidt, B.K.1
Lam, M.S.2
Northcutt, J.D.3
-
75
-
-
0003622823
-
-
SiliconGraphics, Inc., October
-
M. Segal and K. Akeley. The OpenGL Graphics System, A Specification, Version 2.0. http://www. opengl. org, SiliconGraphics, Inc., October 2004.
-
(2004)
The OpenGL Graphics System, A Specification, Version 2.0
-
-
Segal, M.1
Akeley, K.2
-
79
-
-
84942211537
-
Giving Applications Access to Gb/s Networking
-
July
-
J. M. Smith and C. B. S. Traw. Giving Applications Access to Gb/s Networking. IEEE Network, 7(4):44-52, July 1993.
-
(1993)
IEEE Network
, vol.7
, Issue.4
, pp. 44-52
-
-
Smith, J.M.1
Traw, C.B.S.2
-
80
-
-
33745194484
-
Cryptographic Support for a Gigabit Network
-
In, June
-
J. M. Smith, C. B. S. Traw, and D. J. Farber. Cryptographic Support for a Gigabit Network. In Proceedings of INET, pages 229-237, June 1992.
-
(1992)
Proceedings of INET
, pp. 229-237
-
-
Smith, J.M.1
Traw, C.B.S.2
Farber, D.J.3
-
81
-
-
7244254277
-
Magic Boxes and Boots: Security in Hardware
-
October
-
S. Smith. Magic Boxes and Boots: Security in Hardware. IEEE Computer, 37(10): 106-109, October 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.10
, pp. 106-109
-
-
Smith, S.1
-
84
-
-
21644486314
-
-
Trusted Computing Group, version 1.2, April 2004
-
Trusted Computing Group. TCG Specification Architecture Overview, version 1.2. https:www. trustedcomputinggroup. org/home, April 2004.
-
TCG Specification Architecture Overview
-
-
-
86
-
-
84882647396
-
-
Ziff-Davis, Inc
-
Veritest. i-Bench version 1.5, Ziff-Davis, Inc, 2004. http://www.veritest.com/benchmarks/i-bench/.
-
(2004)
Veritest. i-Bench version 1.5
-
-
-
87
-
-
20844455974
-
Challenges in Securing Voice over IP
-
May/June
-
T. J. Walsh and D. R. Kuhn. Challenges in Securing Voice over IP. IEEE Security & Privacy Magazine, 3(3):44-49, May/June 2005.
-
(2005)
IEEE Security & Privacy Magazine
, vol.3
, Issue.3
, pp. 44-49
-
-
Walsh, T.J.1
Kuhn, D.R.2
-
90
-
-
23244459906
-
Trusted Paths for Browsers
-
May
-
Z. Ye, S. Smith, and D. Anthony. Trusted Paths for Browsers. ACM Transactions on Information and System Security (TISSEC), 8(2):153-186, May 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.2
, pp. 153-186
-
-
Ye, Z.1
Smith, S.2
Anthony, D.3
-
91
-
-
0004196480
-
-
PhD thesis, Carnegie Mellon University
-
B. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994.
-
(1994)
Using Secure Coprocessors
-
-
Yee, B.1
-
92
-
-
26844473089
-
Parallel Genetic Algorithms in Programmable Graphics Hardware
-
Q. Yu, C. Chen, and Z. Pan. Parallel Genetic Algorithms in Programmable Graphics Hardware. In Proceedings of ICNC, pages 1051-1059, 2005.
-
(2005)
Proceedings of ICNC
, pp. 1051-1059
-
-
Yu, Q.1
Chen, C.2
Pan, Z.3
|