Transparent memory encryption and authentication.
Mario WernerThomas UnterluggauerRobert SchillingDavid SchaffenrathStefan MangardPublished in: FPL (2017)
Keyphrases
- data encryption
- identity authentication
- encryption decryption
- public key cryptography
- image authentication
- integrity verification
- elliptic curve cryptography
- virtual private network
- memory usage
- security analysis
- memory requirements
- public key
- biometric authentication
- encryption algorithm
- mutual authentication
- high security
- authentication mechanism
- authentication scheme
- encryption scheme
- main memory
- image encryption
- key distribution
- memory space
- key management
- cloud computing
- user authentication
- ciphertext