{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:24:13Z","timestamp":1773771853985,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642174988","type":"print"},{"value":"9783642174995","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17499-5_10","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T13:12:47Z","timestamp":1291727567000},"page":"231-260","source":"Crossref","is-referenced-by-count":6,"title":["Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions"],"prefix":"10.1007","author":[{"given":"Reouven","family":"Elbaz","sequence":"first","affiliation":[]},{"given":"Lionel","family":"Torres","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Sassatelli","sequence":"additional","affiliation":[]},{"given":"Pierre","family":"Guillemin","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Bardouillet","sequence":"additional","affiliation":[]},{"given":"Albert","family":"Martinez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Kocher, P., Lee, R.B., McGraw, G., Raghunathan, A., Ravi, S.: Security as a New Dimension in Embedded System Design. In: Proceedings of the Design Automation Conference (DAC), pp. 753\u2013760 (June 2004)","DOI":"10.1145\/996566.996771"},{"key":"10_CR2","unstructured":"Ravi, S., Raghunathan, A., Chakradhar, S.: Tamper Resistance Mechanisms for Secure Embedded Systems. In: IEEE Intl. Conf. on VLSI Design (January 2004)"},{"key":"10_CR3","unstructured":"Alves, T., Felton, D.: Trustzone: Integrated hardware and software security, ARM white paper (July 2004)"},{"key":"10_CR4","unstructured":"Trusted Computing Group. TCG Specification Architecture Overview Revision 1.2 (April 2004), https:\/\/www.trustedcomputinggroup.org\/groups\/TCG_1_0_Architecture_Overview.pdf"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Huang, A.: Keeping secrets in hardware the microsoft xbox case study. MIT AI Memo (2002)","DOI":"10.1007\/3-540-36400-5_17"},{"key":"10_CR6","first-page":"831","volume":"31","author":"S.W. Smith","year":"1999","unstructured":"Smith, S.W., Weingart, S.H.: Building a High-Performance, Programmable Secure Coprocessor. Computer Networks (Special Issue on Computer Network Security)\u00a031, 831\u2013860 (1999)","journal-title":"Computer Networks (Special Issue on Computer Network Security)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Vaslin, R., Gogniat, G., Diguet, J.P., Wanderley Netto, E., Tessier, R., Burleson, W.P.: A security approach for off-chip memory in embedded microprocessor systems. Microprocessors and Microsystems - Embedded Hardware Design, 37\u201345 (2009)","DOI":"10.1016\/j.micpro.2008.08.008"},{"key":"10_CR8","unstructured":"Vaslin, R., Gogniat, G., Diguet, J.P., Tessier, R., Burleson, W.: High-efficiency protection solution for off-chip memory in embedded systems. In: ERSA 2007, pp. 117\u2013123 (2007)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., Horowitz, M.: Architectural Support for Copy and Tamper Resistant Software. In: Proceedings of the 9th Int\u2019l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), pp. 168\u2013177 (November 2000)","DOI":"10.1145\/384264.379237"},{"key":"10_CR10","unstructured":"Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In: Proceedings of the 17th Int\u2019l Conference on Supercomputing (June 2003)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Suh, G.E.: AEGIS: A Single-Chip Secure Processor, PhD thesis, Massachusetts Institute of Technology (September 2005)","DOI":"10.1016\/j.istr.2005.05.002"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Lee, R.B., Kwan, P.C.S., McGregor, J.P., Dwoskin, J., Wang, Z.: Architecture for Protecting Critical Secrets in Microprocessors. In: Proceedings of the 32nd International Symposium on Computer Architecture (ISCA 2005), pp. 2\u201313 (June 2005)","DOI":"10.1145\/1080695.1069971"},{"key":"10_CR13","first-page":"1","volume":"4","author":"R. Elbaz","year":"2009","unstructured":"Elbaz, R., Champagne, D., Gebotys, C.H., Lee, R.B., Potlapally, N.R., Torres, L.: Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. Transactions on Computational Science\u00a04, 1\u201322 (2009)","journal-title":"Transactions on Computational Science"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Yan, C., Rogers, B., Englender, D., Solihin, Y., Prvulovic, M.: Improving Cost, Performance, and Security of Memory Encryption and Authentication. In: Proc. of the International Symposium on Computer Architecture (2006)","DOI":"10.1145\/1150019.1136502"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Rogers, B., Chhabra, S., Solihin, Y., Prvulovic, M.: Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS\u2013 and Performance\u2013 Friendly. In: Proc. of the 40th IEEE\/ACM Symposium on Microarchitecture, MICRO (2007)","DOI":"10.1109\/MICRO.2007.16"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: Protocols for Public Key Cryptography. In: IEEE Symp. on Security and Privacy, pp. 122\u2013134 (1980)","DOI":"10.1109\/SP.1980.10006"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/11693383_7","volume-title":"Selected Areas in Cryptography","author":"W.E. Hall","year":"2006","unstructured":"Hall, W.E., Jutla, C.S.: Parallelizable authentication trees. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 95\u2013109. Springer, Heidelberg (2006)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Duc, G., Keryell, R.: CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection. In: ACSAC 2006, pp. 483\u2013492 (2006)","DOI":"10.1109\/ACSAC.2006.21"},{"key":"10_CR19","unstructured":"Gassend, B., Suh, G.E., Clarke, D., van Dijk, M., Devadas, S.: Caches and Merkle Trees for Efficient Memory Integrity Verification. In: Proceedings of Ninth International Symposium on High Performance Computer Architecture (February 2003)"},{"key":"10_CR20","unstructured":"Elbaz, R.: Hardware Mechanisms for Secured Processor Memory Transactions in Embedded Systems, PhD Thesis, University of Montpellier -LIRMM (2006)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-540-74735-2_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"R. Elbaz","year":"2007","unstructured":"Elbaz, R., Champagne, D., Lee, R.B., Torres, L., Sassatelli, G., Guillemin, P.: TEC-Tree: A Low Cost and Parallelizable Tree for Efficient Defense against Memory Replay Attacks. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 289\u2013302. Springer, Heidelberg (2007)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C., Horowitz, M.: Implementing an Untrusted Operating System on Trusted Hardware. In: Proc. of the 19th ACM Symposium on Operating Systems Principles (October 2003)","DOI":"10.1145\/945445.945463"},{"key":"10_CR23","unstructured":"Lie, D.: Architectural Support for Copy and Tamper-Resistant Software, Ph.D Thesis, Stanford University (December 2003)"},{"issue":"5","key":"10_CR24","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/TC.2005.80","volume":"54","author":"J. Yang","year":"2005","unstructured":"Yang, J., Gao, L., Zhang, Y.: Improving Memory Encryption Performance in Secure Processors. IEEE Transactions on Computers\u00a054(5), 630\u2013640 (2005)","journal-title":"IEEE Transactions on Computers"},{"key":"10_CR25","unstructured":"National Institute of Science and Technology (NIST), FIPS PUB 197: Advanced Encryption Standard (AES) (November 2001)"},{"key":"10_CR26","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael (March 1999), http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/rijndael\/Rijndael-ammended.pdf"},{"key":"10_CR27","unstructured":"http:\/\/www.arm.com\/pdfs\/ARM9E_flyer_063_4.pdf"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Hodjat, A., Hwang, D., Lai, B.C., Tiri, K., Verbauwhede, I.: A 3.84 gbits\/s AES crypto coprocessor with modes of operation in a 0.18-\u03bcm CMOS technology. In: ACM Great Lakes Symposium on VLSI 2005, pp. 60\u201363 (2005)","DOI":"10.1145\/1057661.1057677"},{"key":"10_CR29","unstructured":"http:\/\/www.arm.com\/products\/DevTools\/MaxSim.html"},{"key":"10_CR30","unstructured":"ARM PrimeCell MultiPort Memory Controller PL172 - Technical Reference Manual, http:\/\/www.nalanda.nitc.ac.in\/industry\/appnotes\/arm\/soc\/DDI0215B_MPMC_PL172.pdf"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Elbaz, R., Torres, L., Sassatelli, G., Guillemin, P., Bardouillet, M., Martinez, A.: A parallelized way to provide data encryption and integrity checking on a processor-memory bus. In: DAC 2006, pp. 506\u2013509 (2006)","DOI":"10.1109\/DAC.2006.229264"},{"key":"10_CR32","unstructured":"The Embedded Microprocessor Benchmark Consortium (EEMBC), http:\/\/www.eembc.org\/"},{"key":"10_CR33","unstructured":"http:\/\/www.arm.com\/products\/DevTools\/MaxSim.html"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal\u00a028 (1949)","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"10_CR35","unstructured":"C S R C (Computer Security Resource Center) - Modes of Operation at, http:\/\/csrc.nist.gov\/CryptoToolkit\/modes\/proposedmodes\/"},{"key":"10_CR36","unstructured":"http:\/\/www.gaisler.com\/"},{"key":"10_CR37","unstructured":"Fruhwirth, C.: New Methods in Hard Disk Encryption. In: Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology (2005)"},{"key":"10_CR38","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/12.729797","volume":"47","author":"M.G. Kuhn","year":"1998","unstructured":"Kuhn, M.G.: Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP. IEEE Trans. Comput.\u00a047, 1153\u20131157 (1998)","journal-title":"IEEE Trans. Comput."},{"key":"10_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Construction Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 531\u2013545. Springer, Heidelberg (2000)"},{"key":"10_CR40","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"10_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1007\/11506157_47","volume-title":"Information Security and Privacy","author":"C.J. Mitchell","year":"2005","unstructured":"Mitchell, C.J.: Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 560\u2013571. Springer, Heidelberg (2005)"},{"key":"10_CR42","unstructured":"Hellstr\u00f6m, H.: Propagating Cipher Feedback (2001), http:\/\/csrc.nist.gov\/CryptoToolkit\/modes\/proposedmodes\/pcfb\/pcfb-spec.pdf"},{"key":"10_CR43","unstructured":"Best, R.M.: Microprocessor for Executing Enciphered programs, U.S. Patent No. 4 168 396, September 18 (1979)"},{"key":"10_CR44","unstructured":"Best, R.M.: Crypto Microprocessor for Executing Enciphered Programs, U.S. Patent No. 4 278 837, July 14 (1981)"},{"key":"10_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"10_CR46","unstructured":"Elbaz, R., Daemen, J., Bertoni, G.: Data parallelized encryption and integrity checking method and device. Patent pending"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science X"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17499-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T14:50:17Z","timestamp":1740754217000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17499-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642174988","9783642174995"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17499-5_10","relation":{},"ISSN":["0302-9743","1866-4741"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1866-4741","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}