Secure Processors Part II: Intel SGX Security Analysis and MIT Sanctum Architecture.
Victor CostanIlia A. LebedevSrinivas DevadasPublished in: Found. Trends Electron. Des. Autom. (2017)
Keyphrases
- security analysis
- security requirements
- smart card
- security properties
- multi core processors
- high security
- security model
- single instruction multiple data
- authentication protocol
- public key
- user authentication
- software architecture
- key exchange
- mutual authentication
- encryption scheme
- authentication scheme
- image encryption
- stream cipher
- encryption algorithm
- secure electronic
- information security
- diffie hellman