-
3
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
A. Akavia, S. Goldwasser, and V. Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In TCC, pages 474-495, 2009.
-
(2009)
TCC
, pp. 474-495
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
4
-
-
33744529805
-
-
Apr. Revised version of earlier 2004-11 version
-
D. J. Bernstein. Cache-timing attacks on AES. http://cr.yp.to/ antiforgery/cachetiming-20050414.pdf, Apr. 2005. Revised version of earlier 2004-11 version.
-
(2005)
Cache-timing Attacks on AES
-
-
Bernstein, D.J.1
-
5
-
-
27544458902
-
Computing architectural vulnerability factors for address-based structures
-
IEEE Computer Society
-
A. Biswas, P. Racunas, R. Cheveresan, J. Emer, S. Mukherjee, and R. Rangan. Computing architectural vulnerability factors for address-based structures. In Proceedings of the 32nd annual international symposium on Computer Architecture, pages 532-543. IEEE Computer Society, 2005.
-
(2005)
Proceedings of the 32nd Annual International Symposium on Computer Architecture
, pp. 532-543
-
-
Biswas, A.1
Racunas, P.2
Cheveresan, R.3
Emer, J.4
Mukherjee, S.5
Rangan, R.6
-
7
-
-
84957063575
-
On the security properties of oaep as an all-or-nothing transform
-
V. Boyko. On the security properties of oaep as an all-or-nothing transform. In CRYPTO, pages 503-518, 1999.
-
(1999)
CRYPTO
, pp. 503-518
-
-
Boyko, V.1
-
8
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai. Exposure-resilient functions and all-or-nothing transforms. In EUR OCR YPT, pages 453-469, 2000.
-
(2000)
EUROCRYPT
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
9
-
-
0000182415
-
A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
-
H. Chernoff. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Statistics, 23:493-507, 1952.
-
(1952)
Ann. Math. Statistics
, vol.23
, pp. 493-507
-
-
Chernoff, H.1
-
12
-
-
77958056591
-
Leakage-resilient storage
-
volume 6280 of Lecture Notes in Computer Science, Springer
-
F. Davi, S. Dziembowski, and D. Venturi. Leakage-resilient storage. In International Conference on Security and Cryptography for Networks (SCN '10), volume 6280 of Lecture Notes in Computer Science, pages 121-137. Springer, 2010.
-
(2010)
International Conference on Security and Cryptography for Networks (SCN '10)
, pp. 121-137
-
-
Davi, F.1
Dziembowski, S.2
Venturi, D.3
-
13
-
-
57949107348
-
Leakage-resilient cryptography
-
S. Dziembowski and K. Pietrzak. Leakage-resilient cryptography. In FOCS, pages 293-302, 2008.
-
(2008)
FOCS
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
14
-
-
35248862449
-
Electromagnetic analysis: Concrete results
-
volume 2162 of Lecture Notes in Computer Science. Springer-Verlag
-
K. Gandolfi, C. Mourtel, and F. Olivier. Electromagnetic Analysis: Concrete Results. In Cryptographic Hardware and Embedded Systems, volume 2162 of Lecture Notes in Computer Science, pages 251-261. Springer-Verlag, 2001.
-
(2001)
Cryptographic Hardware and Embedded Systems
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
16
-
-
84955507265
-
Caches and hash trees for efficient memory integrity verification
-
B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, and S. Devadas. Caches and hash trees for efficient memory integrity verification. In In 9th Intl. Symp. on High Performance Computer Architecture, pages 295-306, 2003.
-
(2003)
9th Intl. Symp. on High Performance Computer Architecture
, pp. 295-306
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
17
-
-
0024627110
-
Degradations due to hole trapping in flash memory cells
-
Mar.
-
S. Haddad, C. Chang, B. Swaminathan, and J. Lien. Degradations due to hole trapping in flash memory cells. IEEE Electron Device Letters, 10(3):117-119, Mar. 1989.
-
(1989)
IEEE Electron Device Letters
, vol.10
, Issue.3
, pp. 117-119
-
-
Haddad, S.1
Chang, C.2
Swaminathan, B.3
Lien, J.4
-
19
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
Y. Ishai, A. Sahai, and D. Wagner. Private circuits: Securing hardware against probing attacks. In CRYPTO, pages 463-481, 2003.
-
(2003)
CRYPTO
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
20
-
-
76749156251
-
The bubblewrap many-core: Popping cores for sequential acceleration
-
New York, NY, USA. ACM
-
U. R. Karpuzcu, B. Greskamp, and J. Torrellas. The bubblewrap many-core: popping cores for sequential acceleration. In Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 42, pages 447-458, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, MICRO
, vol.42
, pp. 447-458
-
-
Karpuzcu, U.R.1
Greskamp, B.2
Torrellas, J.3
-
21
-
-
0033705991
-
Side channel cryptanalysis of product ciphers
-
J. Kelsey, B. Schneier, C. Hall, and D. Wagner. Side channel cryptanalysis of product ciphers. Journal of Computer Security, 8(2-3):141-158, 2000.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.2-3
, pp. 141-158
-
-
Kelsey, J.1
Schneier, B.2
Hall, C.3
Wagner, D.4
-
22
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag
-
P. Kocher, J. J. E, and B. Jun. Differential power analysis. In Advances in Cryptology, pages 388-397. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology
, pp. 388-397
-
-
Kocher, P.1
E, J.J.2
Jun, B.3
-
23
-
-
0022737546
-
Analysis and modeling of floating-gate eeprom cells
-
June
-
A. Kolodny, S. Nieh, B. Eitan, and J. Shappir. Analysis and modeling of floating-gate eeprom cells. Electron Devices, IEEE Transactions on, 33(6):835-844, June 1986.
-
(1986)
Electron Devices IEEE Transactions on
, vol.33
, Issue.6
, pp. 835-844
-
-
Kolodny, A.1
Nieh, S.2
Eitan, B.3
Shappir, J.4
-
24
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
R. B. Lee, P. C. S. Kwan, J. P. Mcgregor, J. Dwoskin, and Z.Wang. Architecture for protecting critical secrets in microprocessors. In Proceedings of the 32nd International Symposium on Computer Architecture (ISCA), 2005.
-
(2005)
Proceedings of the 32nd International Symposium on Computer Architecture (ISCA)
-
-
Lee, R.B.1
Kwan, P.C.S.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
25
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
November
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. SIGPLAN Not., 35:168-177, November 2000.
-
(2000)
SIGPLAN Not.
, vol.35
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
26
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
D. Lim, J. Lee, B. Gassend, G. Suh, M. Van Dijk, and S. Devadas. Extracting secret keys from integrated circuits. Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, 13(10):1200-1205, 2005.
-
(2005)
Very Large Scale Integration (VLSI) Systems IEEE Transactions on
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.2
Gassend, B.3
Suh, G.4
Van Dijk, M.5
Devadas, S.6
-
27
-
-
35048852134
-
Physically observable cryptography
-
LNCS. Springer
-
S. Micali and L. Reyzin. Physically observable cryptography. In TCC 2004, LNCS, pages 278-296. Springer, 2003.
-
(2003)
TCC 2004
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
28
-
-
84944403418
-
A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor
-
December
-
S. S. Mukherjee, C. Weaver, J. Emer, S. K. Reinhardt, and T. Austin. A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor. In 36th Annual International Symposium on Microarchitecture (MICRO), pages 29-40, December 2003.
-
(2003)
36th Annual International Symposium on Microarchitecture (MICRO)
, pp. 29-40
-
-
Mukherjee, S.S.1
Weaver, C.2
Emer, J.3
Reinhardt, S.K.4
Austin, T.5
-
29
-
-
38549120069
-
Partitioned cache architecture as a side channel defence mechanism
-
August
-
D. Page. Partitioned cache architecture as a side channel defence mechanism. In Cryptography ePrint Archive, Report 2005/280, August 2005.
-
(2005)
Cryptography EPrint Archive, Report 2005/280
-
-
Page, D.1
-
30
-
-
70450273507
-
Scalable high performance main memory system using phase-change memory technology
-
New York, NY, USA. ACM
-
M. K. Qureshi, V. Srinivasan, and J. A. Rivers. Scalable high performance main memory system using phase-change memory technology. In Proceedings of the 36th annual international symposium on Computer architecture, ISCA '09, pages 24-33, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 36th Annual International Symposium on Computer Architecture, ISCA '09
, pp. 24-33
-
-
Qureshi, M.K.1
Srinivasan, V.2
Rivers, J.A.3
-
31
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
R. L. Rivest. All-or-nothing encryption and the package transform. In FSE, pages 210-218, 1997.
-
(1997)
FSE
, pp. 210-218
-
-
Rivest, R.L.1
-
32
-
-
57349118429
-
Parallelizing dynamic information flow tracking
-
New York, NY, USA. ACM
-
O. Ruwase, P. B. Gibbons, T. C. Mowry, V. Ramachandran, S. Chen, M. Kozuch, and M. Ryan. Parallelizing dynamic information flow tracking. In SPAA '08: Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, pages 35-45, New York, NY, USA, 2008. ACM.
-
(2008)
SPAA '08: Proceedings of the Twentieth Annual Symposium on Parallelism in Algorithms and Architectures
, pp. 35-45
-
-
Ruwase, O.1
Gibbons, P.B.2
Mowry, T.C.3
Ramachandran, V.4
Chen, S.5
Kozuch, M.6
Ryan, M.7
-
34
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
35
-
-
10844272292
-
Characteristic length and time in electromigration
-
Dec.
-
M. Shatzkes and Y. Huang. Characteristic length and time in electromigration. Journal of Applied Physics, 74(11):6609-6614, Dec. 1993.
-
(1993)
Journal of Applied Physics
, vol.74
, Issue.11
, pp. 6609-6614
-
-
Shatzkes, M.1
Huang, Y.2
-
36
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31(8):831-860, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
37
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
IEEE
-
G. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In Design Automation Conference, 2007. DAC'07. 44th ACM/IEEE, pages 9-14. IEEE, 2007.
-
(2007)
Design Automation Conference, 2007. DAC'07. 44th ACM/IEEE
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
38
-
-
37149044968
-
Aegis: A singlechip secure processor
-
Nov.-Dec.
-
G. Suh, C. O'Donnell, and S. Devadas. Aegis: A singlechip secure processor. Design and Test of Computers, IEEE, 24(6):570-580, Nov.-Dec. 2007.
-
(2007)
Design and Test of Computers, IEEE
, vol.24
, Issue.6
, pp. 570-580
-
-
Suh, G.1
O'Donnell, C.2
Devadas, S.3
-
39
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
New York, NY, USA, ACM Press
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure Program Execution via Dynamic Information Flow Tracking. In ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems, pages 85-96, New York, NY, USA, 2004. ACM Press.
-
(2004)
ASPLOS-XI: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
41
-
-
80052533055
-
Crafting a usable microkernel, processor, and i/o system with strict and provable information flow security
-
M. Tiwari, J. K. Oberg, X. Li, J. Valamehr, T. Levin, B. Hardekopf, R. Kastner, F. T. Chong, and T. Sherwood. Crafting a usable microkernel, processor, and i/o system with strict and provable information flow security. In International Symposium of Computer Architecture (ISCA), 2011.
-
(2011)
International Symposium of Computer Architecture (ISCA)
-
-
Tiwari, M.1
Oberg, J.K.2
Li, X.3
Valamehr, J.4
Levin, T.5
Hardekopf, B.6
Kastner, R.7
Chong, F.T.8
Sherwood, T.9
-
43
-
-
21644475650
-
Rifle: An architectural framework for user-centric information-flow security
-
IEEE Computer Society
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In the 37th IEEE/ACM International Symposium on Microarchitecture, pages 243-254. IEEE Computer Society, 2004.
-
(2004)
The 37th IEEE/ACM International Symposium on Microarchitecture
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
44
-
-
57749197593
-
FlexiTaint: A programmable accelerator for dynamic taint propagation
-
New York, NY, USA. ACM
-
G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic. FlexiTaint: A programmable accelerator for dynamic taint propagation. In Fourteenth International Symposium on High Performance Computer Architecture (HPCA), pages 196-206, New York, NY, USA, 2008. ACM.
-
(2008)
Fourteenth International Symposium on High Performance Computer Architecture (HPCA)
, pp. 196-206
-
-
Venkataramani, G.1
Doudalis, I.2
Solihin, Y.3
Prvulovic, M.4
-
47
-
-
77957277864
-
New algorithms, architectures and applications for reconfigurable computing
-
chapter. Springer, Cambridge, MA
-
T.Wollinger and C. Paar. New Algorithms, Architectures and Applications for Reconfigurable Computing, chapter Security Aspects of FPGAs in Cryptographic Applications, pages 265-278. Springer, Cambridge, MA, 2005.
-
(2005)
Security Aspects of FPGAs in Cryptographic Applications
, pp. 265-278
-
-
Wollinger, T.1
Paar, C.2
|