Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly.
Brian RogersSiddhartha ChhabraMilos PrvulovicYan SolihinPublished in: MICRO (2007)
Keyphrases
- key management
- key exchange
- security analysis
- data encryption
- security properties
- encryption decryption
- digital signature
- encryption scheme
- cryptographic protocols
- operating system
- integrity verification
- data confidentiality
- digital rights management
- high security
- image encryption
- parallel algorithm
- lightweight
- distributed memory
- security issues
- stream cipher
- shared memory
- cryptographic algorithms
- advanced encryption standard
- open source