A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors
暂无分享,去创建一个
[1] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007] , 2004 .
[2] Dan Boneh,et al. Architectural Support For Copy And Tamper-Resistant Software PhD Thesis , 2003 .
[3] Edwin Naroska,et al. A combined hardware and software architecture for secure computing , 2005, CF '05.
[4] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[5] G. Edward Suh,et al. Aegis: A Single-Chip Secure Processor , 2007, IEEE Des. Test Comput..
[6] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[7] Morris J. Dworkin,et al. SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[8] Klaus Waldschmidt,et al. Architecture of Computing Systems - ARCS 2006 , 2006, Lecture Notes in Computer Science.
[9] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[10] Edwin Naroska,et al. A Cache Design for a Security Architecture for Microprocessors (SAM) , 2006, ARCS.
[11] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[12] Leendert van Doorn,et al. The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer , 2004, IBM J. Res. Dev..
[13] Bart Preneel,et al. Cryptographic hash functions , 2010, Eur. Trans. Telecommun..
[14] Alain Villemeur,et al. Methods and techniques , 1992 .