PEM:a lightweight program memory encryption mechanism for embedded processor
暂无分享,去创建一个
[1] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[2] Lionel Torres,et al. Hardware engines for bus encryption: a survey of existing techniques , 2005, Design, Automation and Test in Europe.
[3] G. Edward Suh,et al. Caches and hash trees for efficient memory integrity verification , 2003, The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings..
[4] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[5] Brian Rogers,et al. Improving Cost, Performance, and Security of Memory Encryption and Authentication , 2006, 33rd International Symposium on Computer Architecture (ISCA'06).
[6] Todd M. Austin,et al. SimpleScalar: An Infrastructure for Computer System Modeling , 2002, Computer.
[7] Sheila Frankel,et al. The AES-CBC Cipher Algorithm and Its Use with IPsec , 2003, RFC.
[8] Marten van Dijk,et al. Efficient memory integrity verification and encryption for secure processors , 2003, Proceedings. 36th Annual IEEE/ACM International Symposium on Microarchitecture, 2003. MICRO-36..
[9] Jun Yang,et al. Improving memory encryption performance in secure processors , 2005, IEEE Transactions on Computers.
[10] Robert C. Aitken,et al. Low Power Methodology Manual - for System-on-Chip Design , 2007 .
[11] Markus G. Kuhn,et al. Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP , 1998, IEEE Trans. Computers.
[12] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .