-
1Academic Journal
المؤلفون: Viktor V. Prutyanov, Mikhail Y. Romashikhin, Yan Vugenfirer, Roman A. Solovyev, Aleksandr Y. Romanov
المصدر: IEEE Access, Vol 12, Pp 144812-144817 (2024)
مصطلحات موضوعية: Authentication tree, embedded systems, experimental evaluation, memory encryption, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
مصطلحات موضوعية: Ultra-low latency, Pseudorandom function, Authenticated encryption, Short input, Memory encryption, Beyond 5G (B5G), Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
3Academic Journal
المؤلفون: Anand, Ravi, Banik, Subhadeep, Caforio, Andrea, Ishikawa, Tatsuya, Isobe, Takanori, Liu, Fukang, Minematsu, Kazuhiko, Rahman, Mostafizar, Sakamoto, Kosei
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Vol. 2024 No. 2; 545-587 ; 2569-2925
مصطلحات موضوعية: Ultra-low latency, Pseudorandom function, Authenticated encryption, Short input, Memory encryption, Beyond 5G (B5G)
وصف الملف: application/pdf
-
4Academic Journal
المؤلفون: Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, Francesco Regazzoni
المصدر: IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 3 (2023)
مصطلحات موضوعية: Tweakable Block Ciphers, Lightweight Cryptography, Reflection Ciphers, Memory Encryption, Memory Integrity, Message Authentication Codes, Computer engineering. Computer hardware, TK7885-7895
وصف الملف: electronic resource
-
5Academic Journal
المؤلفون: Avanzi, Roberto, Banik, Subhadeep, Dunkelman, Orr, Eichlseder, Maria, Ghosh, Shibam, Nageler, Marcel, Regazzoni, Francesco
المصدر: IACR Transactions on Symmetric Cryptology; Vol. 2023 No. 3; 25-73 ; 2519-173X
مصطلحات موضوعية: Tweakable Block Ciphers, Lightweight Cryptography, Reflection Ciphers, Memory Encryption, Memory Integrity, Message Authentication Codes
وصف الملف: application/pdf
-
6Academic Journal
المؤلفون: Roberto Avanzi
المصدر: IACR Transactions on Symmetric Cryptology, Pp 4-44 (2017)
مصطلحات موضوعية: Tweakable Block Ciphers, Reflection Ciphers, Even-Mansour Schemes, Almost MDS Matrices, S-Box Search Heuristics, Memory Encryption, Pointer Authentication, Short Hashes, Tweak Masking, Tweak Extension, Computer engineering. Computer hardware, TK7885-7895
وصف الملف: electronic resource
-
7Academic Journal
مصطلحات موضوعية: захист інформації, віртуалізація, гіпервізор, криптографічний процесор, шифрування памяті, мікроархітектура AMD Zen, технологія Secure Encrypted Virtualization, Secure Memory Encryption
وصف الملف: application/pdf
Relation: Реєстрація, зберігання і обробка даних. Т. 20, № 3 : 102–111.; Захист віртуальних машин на основі інструкцій нового покоління процесорів AMD Zen [Текст] / В. С. Соколовський, В. В. Карпінець, Ю. Є. Яремчук [та ін.] // Реєстрація, зберігання і обробка даних. – 2018. – Т. 20, № 3. – С. 102–111.; http://ir.lib.vntu.edu.ua//handle/123456789/23964; 621.384.3
-
8Academic Journal
المؤلفون: Avanzi, Roberto
المصدر: IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 1; 4-44 ; 2519-173X
مصطلحات موضوعية: Tweakable Block Ciphers, Reflection Ciphers, Even-Mansour Schemes, Almost MDS Matrices, S-Box Search Heuristics, Memory Encryption, Pointer Authentication, Short Hashes, Tweak Masking, Tweak Extension
وصف الملف: application/pdf
-
9Conference
المؤلفون: Ege, Bariş, Kavun, Elif, Bilge, Yalçin, Tolga
المساهمون: Middle East Technical University Ankara (METU), Ruhr University Bochum = Ruhr-Universität Bochum (RUB), Emmanuel Prouff, TC 8, TC 11, WG 8.8, WG 11.2
المصدر: Lecture Notes in Computer Science ; 10th Smart Card Research and Advanced Applications (CARDIS) ; https://inria.hal.science/hal-01596296 ; 10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.199-216, ⟨10.1007/978-3-642-27257-8_13⟩
مصطلحات موضوعية: memory encryption, smart card, low-latency block cipher, AES, PRESENT, [INFO]Computer Science [cs], [SHS.INFO]Humanities and Social Sciences/Library and information sciences
Relation: hal-01596296; https://inria.hal.science/hal-01596296; https://inria.hal.science/hal-01596296/document; https://inria.hal.science/hal-01596296/file/978-3-642-27257-8_13_Chapter.pdf
-
10Conference
المؤلفون: Pierpaolo Santucci, Emiliano Ingrassia, Giulio Picierro, Marco Cesati
المساهمون: Santucci, P, Ingrassia, E, Picierro, G, Cesati, M
مصطلحات موضوعية: Cryptography on GPU. Data security. Memory encryption, Settore ING-INF/05 - SISTEMI DI ELABORAZIONE DELLE INFORMAZIONI
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-3-030-57877-0; info:eu-repo/semantics/altIdentifier/wos/WOS:000886445600016; ispartofbook:International Conference on Applied Cryptography and Network Security ACNS 2020, part II; 18th International Conference on Applied Cryptography and Network Security; volume:12147 LNCS; firstpage:323; lastpage:343; numberofpages:21; serie:LECTURE NOTES IN COMPUTER SCIENCE; http://hdl.handle.net/2108/260193; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85091300096; https://link.springer.com/chapter/10.1007/978-3-030-57878-7_16
-
11Academic Journal
المؤلفون: Hidekazu Tadokoro, A Kenichi Kourai, Shigeru Chiba
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: virtual machine, IaaS cloud, information leakage, memory encryption
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.258.9506; http://www.csg.is.titech.ac.jp/paper/tadokoro-acs39.pdf
-
12Academic Journal
المؤلفون: Siddhartha Chhabra, Brian Rogers, Yan Solihin, MILOS PRVULOVIC
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Categories and Subject Descriptors, C.1.0 [Processor Architectures, General General Terms, Security, Performance, Design Additional KeyWords and Phrases, Secure Processor Architectures, Memory Encryption, Memory Integrity Verification, Virtualization
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.487.227; http://www.ece.ncsu.edu/arpers/Papers/Sid-TACO.pdf
-
13Conference
المؤلفون: Zuo, Pengfei, Hua, Yu, Xie, Yuan
مصطلحات موضوعية: Crash consistency, Memory encryption, Non-volatile memory
Relation: https://repository.hkust.edu.hk/ir/Record/1783.1-133220; 52nd Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2019 / Association for Computing Machinery. New York, NY : Association for Computing Machinery, 2019, p. 479-492; https://doi.org/10.1145/3352460.3358290; http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=1072-4451&rft.volume=&rft.issue=&rft.date=2019&rft.spage=479&rft.aulast=Zuo&rft.aufirst=Pengfei&rft.atitle=SuperMem%3A+Enabling+application-transparent+secure+persistent+memory+with+low+overheads&rft.title=Proceedings+of+the+Annual+International+Symposium+on+Microarchitecture,+MICRO; http://www.scopus.com/record/display.url?eid=2-s2.0-85074448019&origin=inward; http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=000519057400036
الاتاحة: https://repository.hkust.edu.hk/ir/Record/1783.1-133220
https://doi.org/10.1145/3352460.3358290
http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=1072-4451&rft.volume=&rft.issue=&rft.date=2019&rft.spage=479&rft.aulast=Zuo&rft.aufirst=Pengfei&rft.atitle=SuperMem%3A+Enabling+application-transparent+secure+persistent+memory+with+low+overheads&rft.title=Proceedings+of+the+Annual+International+Symposium+on+Microarchitecture,+MICRO
http://www.scopus.com/record/display.url?eid=2-s2.0-85074448019&origin=inward
http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=000519057400036 -
14Conference
المساهمون: Izzo, Niccolò, Barenghi, Alessandro, Breveglieri, Luca, Pelosi, Gerardo, Amato, Paolo
مصطلحات موضوعية: secure memories, embedded security, memory encryption, emerging memories, security protocols
وصف الملف: STAMPA
Relation: info:eu-repo/semantics/altIdentifier/isbn/9781450366854; info:eu-repo/semantics/altIdentifier/wos/WOS:000474686400069; ispartofbook:Proceedings of the 16th ACM International Conference on Computing Frontiers; 16th ACM International Conference on Computing Frontiers; firstpage:386; lastpage:391; numberofpages:6; http://hdl.handle.net/11311/1097592; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85066053251; https://dl.acm.org/citation.cfm?id=3323401
-
15
المؤلفون: Alessandro Barenghi, Niccolò Izzo, Paolo Amato, Luca Breveglieri, Gerardo Pelosi
المصدر: CF
مصطلحات موضوعية: 010302 applied physics, embedded security, Hardware_MEMORYSTRUCTURES, security protocols, Computer science, business.industry, Controller (computing), Plaintext, 02 engineering and technology, Cryptographic protocol, Encryption, 01 natural sciences, 020202 computer hardware & architecture, Embedded system, 0103 physical sciences, Scalability, 0202 electrical engineering, electronic engineering, information engineering, secure memories, embedded security, memory encryption, emerging memories, security protocols, emerging memories, memory encryption, Persistent data structure, business, secure memories, Host (network), Dram
-
16
المؤلفون: Huber, Manuel
المساهمون: Eckert, Claudia (Prof. Dr.), Sigl, Georg (Prof. Dr.)
مصطلحات موضوعية: Betriebssystemlevelvirtualisierung, Kaltstartangriffe, Hauptspeicherverschlüsselung, AMD SEV, ddc:000, Informatik, Wissen, Systeme, OS-level virtualization, cold boot attacks, main memory encryption, AMD SEV
وصف الملف: application/pdf
-
17Dissertation/ Thesis
المؤلفون: Huber, Manuel
المساهمون: Eckert, Claudia (Prof. Dr.), Sigl, Georg (Prof. Dr.)
مصطلحات موضوعية: info:eu-repo/classification/ddc/000, Informatik, Wissen, Systeme, OS-level virtualization, cold boot attacks, main memory encryption, AMD SEV, Betriebssystemlevelvirtualisierung, Kaltstartangriffe, Hauptspeicherverschlüsselung
وصف الملف: application/pdf
Relation: https://mediatum.ub.tum.de/1518642; https://mediatum.ub.tum.de/doc/1518642/document.pdf; http://nbn-resolving.de/urn:nbn:de:bvb:91-diss-20191216-1518642-1-5
-
18Conference
المؤلفون: Horsch, Julian, Huber, Manuel, Wessel, Sascha
مصطلحات موضوعية: RAM encryption, Main Memory Encryption, ARM hypervisor, Cold Boot Attack, DMA, android
Time: 003, 005, 006, 518
وصف الملف: application/pdf
Relation: International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2017; International Conference on Big Data Science and Engineering (BigDataSE) 2017; International Conference on Embedded Software and Systems (ICESS) 2017; 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017; https://publica.fraunhofer.de/handle/publica/402116
-
19Academic Journal
المؤلفون: Hidekazu Tadokoro, Kenichi Kourai, Shigeru Chiba
المصدر: Information and Media Technologies. 2012, 7(4):1421
-
20
المؤلفون: Sergei Skorobogatov
المصدر: DSD
مصطلحات موضوعية: 010302 applied physics, glitching attacks, business.industry, Computer science, 020208 electrical & electronic engineering, ROM, EEPROM and Flash memory, 02 engineering and technology, microprobing attacks, computer.software_genre, Encryption, Computer security, 01 natural sciences, Bus encryption, Microcontroller, Embedded system, 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, Confidentiality, memory encryption, Smart card, On-the-fly encryption, EPROM, business, computer, Mask ROM