{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:59:40Z","timestamp":1725641980299},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272561"},{"type":"electronic","value":"9783642272578"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27257-8_13","type":"book-chapter","created":{"date-parts":[[2011,12,12]],"date-time":"2011-12-12T00:50:42Z","timestamp":1323651042000},"page":"199-216","source":"Crossref","is-referenced-by-count":7,"title":["Memory Encryption for Smart Cards"],"prefix":"10.1007","author":[{"given":"Bar\u0131\u015f","family":"Ege","sequence":"first","affiliation":[]},{"given":"Elif Bilge","family":"Kavun","sequence":"additional","affiliation":[]},{"given":"Tolga","family":"Yal\u00e7\u0131n","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","first-page":"483","volume-title":"Proceedings of the 22nd Annual Computer Security Applications Conference","author":"G. Duc","year":"2006","unstructured":"Duc, G., Keryell, R.: Cryptopage: An efficient secure architecture with memory encryption, integrity and information leakage protection. In: Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 483\u2013492. IEEE Computer Society, Washington, DC, USA (2006) ISBN 0-7695-2716-7"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1055626.1055631","volume":"33","author":"B. Rogers","year":"2005","unstructured":"Rogers, B., Solihin, Y., Prvulovic, M.: Memory predecryption: hiding the latency overhead of memory encryption. SIGARCH Comput. Archit. News\u00a033, 27\u201333 (2005)","journal-title":"SIGARCH Comput. Archit. News"},{"key":"13_CR3","first-page":"14","volume-title":"Proceedings of the 32nd Annual International Symposium on Computer Architecture, ISCA 2005","author":"W. Shi","year":"2005","unstructured":"Shi, W., Lee, H.-H.S., Ghosh, M., Lu, C., Boldyreva, A.: High efficiency counter mode security architecture via prediction and precomputation. In: Proceedings of the 32nd Annual International Symposium on Computer Architecture, ISCA 2005, pp. 14\u201324. IEEE Computer Society, Washington, DC, USA (2005) ISBN 0-7695-2270-X"},{"key":"13_CR4","first-page":"339","volume-title":"Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36","author":"G. Edward Suh","year":"2003","unstructured":"Edward Suh, G., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: Efficient memory integrity verification and encryption for secure processors. In: Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36, p. 339. IEEE Computer Society, Washington, DC, USA (2003)"},{"key":"13_CR5","first-page":"351","volume-title":"Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36","author":"J. Yang","year":"2003","unstructured":"Yang, J., Zhang, Y., Gao, L.: Fast secure processor for inhibiting software piracy and tampering. In: Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36, p. 351. IEEE Computer Society, Washington, DC, USA (2003) ISBN 0-7695-2043-X"},{"key":"13_CR6","unstructured":"IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices. IEEE Std 1619-2007, c1\u2013c32, April 18 (2008)"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30539-2_2","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"P. Rogaway","year":"2004","unstructured":"Rogaway, P.: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 16\u201331. Springer, Heidelberg (2004) 10.1007\/978-3-540-30539-2_2"},{"key":"13_CR8","unstructured":"Alyanaklan, E., et al.: The smart & secure world in 2020. Technical report, Eurosmart (2007)"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/10721064_26","volume-title":"Proceedings of the The International Conference on Smart Card Research and Applications","author":"J. Daemen","year":"2000","unstructured":"Daemen, J., Rijmen, V.: The block cipher rijndael. In: Proceedings of the The International Conference on Smart Card Research and Applications, pp. 277\u2013284. Springer, London (2000) ISBN 3-540-67923-5"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J., Seurin, Y., Vikkelsoe, C.: Present: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007) ISBN 978-3-540-74734-5"},{"issue":"3","key":"13_CR11","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1007\/s00145-010-9073-y","volume":"24","author":"M. Liskov","year":"2011","unstructured":"Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. J. Cryptology\u00a024(3), 588\u2013613 (2011)","journal-title":"J. Cryptology"},{"key":"13_CR12","unstructured":"Lie, D.J.: Architectural support for copy and tamper-resistant software. PhD thesis, Stanford, CA, USA (2004) AAI3111747"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1145\/1146909.1147042","volume-title":"Proceedings of the 43rd Annual Design Automation Conference, DAC 2006","author":"R. Elbaz","year":"2006","unstructured":"Elbaz, R., Torres, L., Sassatelli, G., Guillemin, P., Bardouillet, M., Martinez, A.: A parallelized way to provide data encryption and integrity checking on a processor-memory bus. In: Proceedings of the 43rd Annual Design Automation Conference, DAC 2006, pp. 506\u2013509. ACM, New York (2006) ISBN 1-59593-381-6"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-01004-0_1","volume-title":"Transactions on Computational Science IV","author":"R. Elbaz","year":"2009","unstructured":"Elbaz, R., Champagne, D., Gebotys, C., Lee, R.B., Potlapally, N., Torres, L.: Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science IV. LNCS, vol.\u00a05430, pp. 1\u201322. Springer, Heidelberg (2009)"},{"key":"13_CR15","unstructured":"Leander, G.: Small scale variants of the block cipher present. Cryptology ePrint Archive, Report 2010\/143 (2010), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"13_CR16","unstructured":"Li, H., Friggstad, Z.: An efficient architecture for the aes mix columns operation. ISCAS\u00a0(5), 4637\u20134640 (2005)"},{"key":"13_CR17","unstructured":"Paar, C.: Efficient VLSI Architectures for Bit-Parallel Computation in Galois Fields. PhD thesis, Institute for Experimental Mathematics, Universit\u00e4t Essen (1994)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27257-8_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T11:41:30Z","timestamp":1620042090000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27257-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272561","9783642272578"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27257-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}