-
3
-
-
51849104627
-
TrustZone: Integrated hardware and software security
-
ALVES, T., AND FELTON, D. TrustZone: Integrated Hardware and Software Security. In ARM Inc. White Paper (2004).
-
(2004)
ARM Inc. White Paper
-
-
Alves, T.1
Felton, D.2
-
4
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
BELLARE, M., AND NAMPREMPRE, C. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In ASIAGRYPT (2000).
-
(2000)
ASIAGRYPT
-
-
Bellare, M.1
Namprempre, C.2
-
5
-
-
33947591276
-
A new approach of TPM construction based on J2810
-
Bo, Z., HUANGUO, Z., AND Rui, H. A New Approach of TPM Construction Based on J2810. In WUJNS (2007).
-
(2007)
WUJNS
-
-
Bo, Z.1
Huanguo, Z.2
Rui, H.3
-
6
-
-
79959540407
-
A platform-level trust-architecture for hand-held devices
-
BRIZEK, J., KHAN, M., SEIFERT, J.-P., AND WHEELER, D. A Platform-level Trust-Architecture for Hand-held Devices. In CRASH (2005).
-
(2005)
CRASH
-
-
Brizek, J.1
Khan, M.2
Seifert, J.-P.3
Wheeler, D.4
-
9
-
-
33846488553
-
A logical approach to NVM integration in SOC design
-
DE VRIES, A., AND MA, Y. A Logical Approach to NVM Integration in SOC Design. EDN 2 (2007).
-
(2007)
EDN 2
-
-
De Vries, A.1
Ma, Y.2
-
12
-
-
68949195262
-
FPGA intrinsic PUFs and their use for IP protection
-
GUAJARDO, J., KUMAR, S., SCHRIJEN, G.-J., AND TUYLS, P. FPGA intrinsic PUFs and their use for IP protection. In CHES (2007).
-
(2007)
CHES
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.-J.3
Tuyls, P.4
-
13
-
-
85175132913
-
-
HELION. SHA-1 Cores. www.hellontech.com.
-
SHA-1 Cores
-
-
-
14
-
-
2442532948
-
An embedded true random number generator for FPGAs
-
KOHLBRENNER, P., AND GAJ, K. An embedded true random number generator for FPGAs. In FPGA (2004).
-
(2004)
FPGA
-
-
Kohlbrenner, P.1
Gaj, K.2
-
15
-
-
84941192747
-
Secure data management in trusted computing
-
KÜHN, U., KURSAWE, K., LUCKS, S., SADEGHI, A.-R., AND STUBLE, C. Secure data management in trusted computing. In CHES (2005).
-
(2005)
CHES
-
-
Kühn, U.1
Kursawe, K.2
Lucks, S.3
Sadeghi, A.-R.4
Stuble, C.5
-
17
-
-
26444526585
-
Hash function based on block ciphers
-
LAI, X., AND MASSEY, J. L. Hash function based on block ciphers. In EUROGRYPT (1992).
-
(1992)
EUROGRYPT
-
-
Lai, X.1
Massey, J.L.2
-
21
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
SAILER, R., ZHANG, X., JAEGER, T., AND VAN DOORN, L. Design and Implementation of a TCG-based Integrity Measurement Architecture. In USENIX Security Symposium (2004).
-
(2004)
USENIX Security Symposium
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
22
-
-
31344454443
-
On a new way to read data from memory
-
SAMYDE, D., SKOROBOGATOV, S., ANDERSON, R., AND QUISQUATER, J.-J. On a new way to read data from memory. Proceedings of IEEE Security in Storage Workshop (2002).
-
(2002)
Proceedings of IEEE Security in Storage Workshop
-
-
Samyde, D.1
Skorobogatov, S.2
Anderson, R.3
Quisquater, J.-J.4
-
23
-
-
70350729562
-
Offline hardware/software authentication for reconfigurable platforms
-
SIMPSON, E., AND SCHAUMONT, P. Offline hardware/software authentication for reconfigurable platforms. In CHES (2006).
-
(2006)
CHES
-
-
Simpson, E.1
Schaumont, P.2
-
24
-
-
85175133773
-
-
THE TRUSTED COMPUTING GROUP (TCG). www.trustedcomputinggroup.org.
-
-
-
-
26
-
-
85175130553
-
-
IEEE 94
-
ZAMBRENO, J., HONBO, D., CHOUDHARY, A., SIMHA, R., AND NARAHAR, B. High-performance software protection using reconfigurable architectures. IEEE 94 (2006).
-
(2006)
High-performance Software Protection Using Reconfigurable Architectures
-
-
Zambreno, J.1
Honbo, D.2
Choudhary, A.3
Simha, R.4
Narahar, B.5
|