Protecting cryptographic keys and computations via virtual secure coprocessing.
John Patrick McGregorRuby B. LeePublished in: SIGARCH Comput. Archit. News (2005)
Keyphrases
- security protocols
- parallel computation
- key management
- secure communication
- hash functions
- graphics processors
- secret key
- encryption key
- data transfer
- cryptographic protocols
- encryption scheme
- private key
- digital signature
- smart card
- execution model
- security properties
- public key
- security analysis
- security requirements
- highly optimized
- memory resident
- advanced encryption standard
- ad hoc networks
- elliptic curve
- authentication protocol
- key distribution
- complex data types
- general purpose
- floating point
- parallel processing
- parallel algorithm
- data types
- access control
- multi dimensional