메뉴 건너뛰기




Volumn , Issue , 2012, Pages 130-141

Inspection resistant memory: Architectural support for security from physical examination

Author keywords

[No Author keywords available]

Indexed keywords

ARCHITECTURAL SUPPORT; HARDWARE SYSTEM; MEMORY TECHNOLOGY; ON CHIP MEMORY; ON CHIPS; PHYSICAL ANALYSIS; SECURITY SCHEME; SIDE EFFECT;

EID: 84864858804     PISSN: 10636897     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCA.2012.6237012     Document Type: Conference Paper
Times cited : (23)

References (49)
  • 3
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • A. Akavia, S. Goldwasser, and V. Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In TCC, pages 474-495, 2009.
    • (2009) TCC , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 4
    • 33744529805 scopus 로고    scopus 로고
    • Apr. Revised version of earlier 2004-11 version
    • D. J. Bernstein. Cache-timing attacks on AES. http://cr.yp.to/ antiforgery/cachetiming-20050414.pdf, Apr. 2005. Revised version of earlier 2004-11 version.
    • (2005) Cache-timing Attacks on AES
    • Bernstein, D.J.1
  • 7
    • 84957063575 scopus 로고    scopus 로고
    • On the security properties of oaep as an all-or-nothing transform
    • V. Boyko. On the security properties of oaep as an all-or-nothing transform. In CRYPTO, pages 503-518, 1999.
    • (1999) CRYPTO , pp. 503-518
    • Boyko, V.1
  • 8
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai. Exposure-resilient functions and all-or-nothing transforms. In EUR OCR YPT, pages 453-469, 2000.
    • (2000) EUROCRYPT , pp. 453-469
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 9
    • 0000182415 scopus 로고
    • A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
    • H. Chernoff. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Statistics, 23:493-507, 1952.
    • (1952) Ann. Math. Statistics , vol.23 , pp. 493-507
    • Chernoff, H.1
  • 13
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • S. Dziembowski and K. Pietrzak. Leakage-resilient cryptography. In FOCS, pages 293-302, 2008.
    • (2008) FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 14
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic analysis: Concrete results
    • volume 2162 of Lecture Notes in Computer Science. Springer-Verlag
    • K. Gandolfi, C. Mourtel, and F. Olivier. Electromagnetic Analysis: Concrete Results. In Cryptographic Hardware and Embedded Systems, volume 2162 of Lecture Notes in Computer Science, pages 251-261. Springer-Verlag, 2001.
    • (2001) Cryptographic Hardware and Embedded Systems , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 19
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • Y. Ishai, A. Sahai, and D. Wagner. Private circuits: Securing hardware against probing attacks. In CRYPTO, pages 463-481, 2003.
    • (2003) CRYPTO , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 22
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Springer-Verlag
    • P. Kocher, J. J. E, and B. Jun. Differential power analysis. In Advances in Cryptology, pages 388-397. Springer-Verlag, 1999.
    • (1999) Advances in Cryptology , pp. 388-397
    • Kocher, P.1    E, J.J.2    Jun, B.3
  • 27
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography
    • LNCS. Springer
    • S. Micali and L. Reyzin. Physically observable cryptography. In TCC 2004, LNCS, pages 278-296. Springer, 2003.
    • (2003) TCC 2004 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 29
    • 38549120069 scopus 로고    scopus 로고
    • Partitioned cache architecture as a side channel defence mechanism
    • August
    • D. Page. Partitioned cache architecture as a side channel defence mechanism. In Cryptography ePrint Archive, Report 2005/280, August 2005.
    • (2005) Cryptography EPrint Archive, Report 2005/280
    • Page, D.1
  • 31
    • 84947912552 scopus 로고    scopus 로고
    • All-or-nothing encryption and the package transform
    • R. L. Rivest. All-or-nothing encryption and the package transform. In FSE, pages 210-218, 1997.
    • (1997) FSE , pp. 210-218
    • Rivest, R.L.1
  • 34
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 35
    • 10844272292 scopus 로고
    • Characteristic length and time in electromigration
    • Dec.
    • M. Shatzkes and Y. Huang. Characteristic length and time in electromigration. Journal of Applied Physics, 74(11):6609-6614, Dec. 1993.
    • (1993) Journal of Applied Physics , vol.74 , Issue.11 , pp. 6609-6614
    • Shatzkes, M.1    Huang, Y.2
  • 36
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31(8):831-860, 1999.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 831-860
    • Smith, S.W.1    Weingart, S.2
  • 37
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • IEEE
    • G. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In Design Automation Conference, 2007. DAC'07. 44th ACM/IEEE, pages 9-14. IEEE, 2007.
    • (2007) Design Automation Conference, 2007. DAC'07. 44th ACM/IEEE , pp. 9-14
    • Suh, G.1    Devadas, S.2
  • 47
    • 77957277864 scopus 로고    scopus 로고
    • New algorithms, architectures and applications for reconfigurable computing
    • chapter. Springer, Cambridge, MA
    • T.Wollinger and C. Paar. New Algorithms, Architectures and Applications for Reconfigurable Computing, chapter Security Aspects of FPGAs in Cryptographic Applications, pages 265-278. Springer, Cambridge, MA, 2005.
    • (2005) Security Aspects of FPGAs in Cryptographic Applications , pp. 265-278
    • Wollinger, T.1    Paar, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.