-
1
-
-
79960549995
-
-
Advanced Access Content System, Feb.
-
Advanced Access Content System, Prerecorded Video Book v0.91, http:// www.aacsla.com/specifications, Feb. 2006.
-
(2006)
Prerecorded Video Book v0.91
-
-
-
2
-
-
0000608018
-
Transaction security system
-
D. Abraham, G. Dolan, G. Double, and J. Stevens, "Transaction Security System," IBM Systems J., vol. 30, no. 2, pp. 206-229, 1991.
-
(1991)
IBM Systems J.
, vol.30
, Issue.2
, pp. 206-229
-
-
Abraham, D.1
Dolan, G.2
Double, G.3
Stevens, J.4
-
4
-
-
84957018842
-
Low Cost Attacks on Tamper Resistant Devices
-
Security Protocols
-
R. Anderson and M. Kuhn, "Low Cost Attacks on Tamper Resistant Devices," Proc. Fifth Int'l Workshop Security Protocols, pp. 125-136, 1997. (Pubitemid 128023885)
-
(1998)
Lecture Notes in Computer Science
, Issue.1361
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.2
-
5
-
-
33845228975
-
-
Technical Report UCAM-CL-TR-641 Univ. of Cambridge, Computer Laboratory, Aug.
-
R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov, "Cryptographic Processors-A Survey," Technical Report UCAM-CL-TR-641, Univ. of Cambridge, Computer Laboratory, Aug. 2005.
-
(2005)
Cryptographic Processors-A Survey
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
6
-
-
79251578513
-
On the (Im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, "On the (Im)possibility of Obfuscating Programs," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '01), 2001.
-
(2001)
Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '01)
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
7
-
-
79960491438
-
-
Dallas Semiconductor/Maxim
-
Dallas Semiconductor/Maxim, High-Speed Secure Microcontroller DS5250, http://www.maxim-ic.com/quick-view2.cfm/qv-pk/3932, 2006.
-
(2006)
High-Speed Secure Microcontroller DS5250
-
-
-
9
-
-
33746075803
-
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
-
R. Gennaro, A. Lysyanskaya, T. Malkin, S. Micali, and T. Rabin, "Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering," Proc. Theory of Cryptography Conf., 2004.
-
(2004)
Proc. Theory of Cryptography Conf.
-
-
Gennaro, R.1
Lysyanskaya, A.2
Malkin, T.3
Micali, S.4
Rabin, T.5
-
10
-
-
84949517809
-
Probing attacks on tamper-resistant devices
-
H. Handschuh, P. Paillier, and J. Stern, "Probing Attacks on Tamper-Resistant Devices," Proc. First Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '99), pp. 303-315, 1999.
-
(1999)
Proc. First Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '99)
, pp. 303-315
-
-
Handschuh, H.1
Paillier, P.2
Stern, J.3
-
12
-
-
24144487305
-
Private circuits: Securing hardware against probing attacks
-
Y. Ishai, A. Sahai, and D. Wagner, "Private Circuits: Securing Hardware against Probing Attacks," Proc. 23rd Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '03), pp. 462-479, 2003.
-
(2003)
Proc. 23rd Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '03)
, pp. 462-479
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
13
-
-
58449094011
-
Private circuits II: Keeping secrets in tamperable circuits
-
Y. Ishai, M. Prabhakaran, A. Sahai, and D. Wagner, "Private Circuits II: Keeping Secrets in Tamperable Circuits," Proc. 25th Ann. Int'l Conf. Thoery and Applications of Cryptographic Techniques (Eurocrypt '06), 2006.
-
(2006)
Proc. 25th Ann. Int'l Conf. Thoery and Applications of Cryptographic Techniques (Eurocrypt '06)
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
Wagner, D.4
-
14
-
-
79960527997
-
Permutation operations in block ciphers
-
Nova Science, Sept.
-
R.B. Lee, R.L. Rivest, M.J.B. Robshaw, Z.J. Shi, and Y.L. Yin, "Permutation Operations in Block Ciphers," Embedded Cryptographic Hardware: Design and Security, Nova Science, Sept. 2004.
-
(2004)
Embedded Cryptographic Hardware: Design and Security
-
-
Lee, R.B.1
Rivest, R.L.2
Robshaw, M.J.B.3
Shi, Z.J.4
Yin, Y.L.5
-
16
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
DOI 10.1109/TVLSI.2005.859470
-
D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. van Dijk, and S. Devadas, "Extracting Secret Keys from Integrated Circuits," IEEE Trans. Very Large Scale Integration (VLSI) Systems, vol. 13, no. 10, pp. 1200-1205, Oct. 2005. (Pubitemid 43131686)
-
(2005)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
18
-
-
31344454443
-
On a new way to read data from memory
-
D. Samyde, S. Skorobogatov, R. Anderson, and J.-J. Quisquater, "On a New Way to Read Data from Memory," Proc. First Int'l IEEE Security in Storage Workshop, pp. 65-69, 2002.
-
(2002)
Proc. First Int'l IEEE Security in Storage Workshop
, pp. 65-69
-
-
Samyde, D.1
Skorobogatov, S.2
Anderson, R.3
Quisquater, J.-J.4
-
20
-
-
27244445173
-
-
PhD thesis, Technical Report UCAM-CL-TR-630, Univ. of Cambridge, Computer Laboratory, Apr.
-
S. Skorobogatov, "Semi-Invasive Attacks: A New Approach to Hardware Security Analysis," PhD thesis, Technical Report UCAM-CL-TR-630, Univ. of Cambridge, Computer Laboratory, Apr. 2005.
-
(2005)
Semi-Invasive Attacks: A New Approach to Hardware Security Analysis
-
-
Skorobogatov, S.1
-
21
-
-
84869436341
-
Read-proof hardware from protective coatings
-
P. Tuyls, G. Schrijen, B. Skoric, J. Geloven, N. Verhaegh, and R. Wolters, "Read-Proof Hardware from Protective Coatings," Proc. Eighth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '06), 2006.
-
(2006)
Proc. Eighth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '06)
-
-
Tuyls, P.1
Schrijen, G.2
Skoric, B.3
Geloven, J.4
Verhaegh, N.5
Wolters, R.6
|