Anatomy and Performance of SSL Processing
暂无分享,去创建一个
Laxmi N. Bhuyan | Li Zhao | Srihari Makineni | Ravi R. Iyer | R. Iyer | S. Makineni | Li Zhao | L. Bhuyan
[1] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[2] Ruby B. Lee,et al. Efficient permutation instructions for fast software cryptography , 2001 .
[3] R. Iyer,et al. Architectural impact of secure socket layer on Internet servers , 2000, Proceedings 2000 International Conference on Computer Design.
[4] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[5] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[6] Richard Uhlig,et al. SoftSDV: A Presilicon Software Development Environment for the IA-64 Architecture , 1999 .
[7] Todd M. Austin,et al. Architectural support for fast symmetric-key cryptography , 2000, SIGP.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Todd M. Austin,et al. CryptoManiac: a fast flexible architecture for secure communication , 2001, Proceedings 28th Annual International Symposium on Computer Architecture.
[10] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .