{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:20:57Z","timestamp":1742383257076},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_17","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"213-227","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Keeping Secrets in Hardware: The Microsoft XboxTM Case Study"],"prefix":"10.1007","author":[{"given":"Andrew","family":"Huang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"17_CR1","unstructured":"Federal Information Processing Standards Publication, FIPS PUB 185: Escrowed Encryption Standard (EES)\n                  \n                    http:\/\/www.itl.nist.gov\/.pspubs\/.p185.htm"},{"key":"17_CR2","unstructured":"Thomas W. Krygowski, Jeffry J. Sniegowski, M. Steven Rodgers, Stephen Montague, James J. Allen, Jerome F. Jakubczak, Samuel L. Miller, Infrastructure, Technology and Applications Of Micro-Electro-Mechanical Systems (MEMS), Sandia National Laboratories, Intelligent Micromachine Department, \n                    http:\/\/www.mdl.sandia.gov\/Micromachine\n                    \n                  , also appears in Sensor Expo 1999."},{"key":"17_CR3","unstructured":"IBM, IBM 4758 PCI Cryptographic Coprocessor, \n                    http:\/\/www.ibm.com\/security\/cryptocards\/"},{"key":"17_CR4","unstructured":"Gemplus (a smartcard vendor), Gemplus Corporate Website, \n                    http:\/\/www.gemplus.com"},{"key":"17_CR5","unstructured":"Pil Joon Lee, Eun Jeong Lee, Yong Duk Kim, How to Implement Cost-Effective and Secure Public Key Cryptosystems Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems (CHES), August 1999."},{"key":"17_CR6","unstructured":"Federal Information Processing Standards Publication, FIPS PUB 140-2: Security Requirements for Cryptographic Modules, \n                    http:\/\/csrc.nist.gov\/publications\/.ps\/.ps140-2\/.ps1402.pdf"},{"key":"17_CR7","unstructured":"distributed.net, distributed.net: Project RC5, \n                    http:\/\/www.distributed.net\/rc5\/"},{"key":"17_CR8","unstructured":"HyperTransport Consortium, HyperTransportTM I\/O Link Specification, Version 1.03, \n                    http:\/\/www.hypertransport.org"},{"key":"17_CR9","unstructured":"nVidia Corporation, nForce MCP Product Overview, 06.01v1, \n                    http:\/\/www.nvidia.com"},{"key":"17_CR10","unstructured":"Microsoft Developer Network, Introduction to Code Signing, \n                    http:\/\/msdn.microsoft.com\/workshop\/security\/authcode\/intro authenticode.asp"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Nicholas P. Carter, Stephen W. Keckler, and William J. Dally, Hardware support for fast capability-based addressing, Proceedings of ASPLOS VI, October 1994, pp. 319\u201327.","DOI":"10.1145\/381792.195579"},{"key":"17_CR12","unstructured":"Jeremy Brown, J.P. Grossman, Andrew Huang, and Thomas F. Knight, Jr., A capability representation with embedded address and nearly-exact object bounds, Project Aries Technical Memo 5, \n                    http:\/\/www.ai.mit.edu\/projects\/aries\/Documents\/Memos\/ARIES-05.pdf"},{"key":"17_CR13","unstructured":"Auguste Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, vol. IX, pp. 5\u201338, Jan. 1883, pp. 161\u2013191, Feb. 1883."},{"key":"17_CR14","unstructured":"Marcus Comstedt, Dreamcast Programming-Bootable CD-Rs, \n                    http:\/\/mc.pp.se\/dc\/cdr.html\n                    \n                  ."},{"key":"17_CR15","unstructured":"R. Anderson and M. Kuhn, Tamper Resistance-a Cautionary Note, Proceedings of the Second Usenix Workshop on Electronic Commerce, pp. 1\u201311, November 1996."},{"key":"17_CR16","series-title":"Lect Notes Comput Sci","volume-title":"Low Cost Attacks on Tamper Resistant Devices","author":"R. Anderson","year":"1997","unstructured":"R. Anderson and M. Kuhn, Low Cost Attacks on Tamper Resistant Devices, IWSP: International Workshop on Security Protocols, LNCS, 1997."},{"key":"17_CR17","unstructured":"Van Hook, et al., High Performance Low Cost Video Game System with Coprocessor Providing High Speed Efficient 3D Graphics and Digital Audio Signal Processing, U.S. Patent 6,239,810, May 29, 2001."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T01:25:11Z","timestamp":1558488311000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}