{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T19:10:02Z","timestamp":1745953802951,"version":"3.40.4"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,1,26]],"date-time":"2013-01-26T00:00:00Z","timestamp":1359158400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s13389-013-0047-5","type":"journal-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T07:58:16Z","timestamp":1359100696000},"page":"129-138","source":"Crossref","is-referenced-by-count":2,"title":["Minimizing performance overhead in memory encryption"],"prefix":"10.1007","volume":"3","author":[{"given":"Michael T.","family":"Kurdziel","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcin","family":"Lukowiak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael A.","family":"Sanfilippo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,1,26]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MC.2002.1039525","volume":"35","author":"AB Huang","year":"2002","unstructured":"Huang, A.B.: The trusted PC: dkin-deep security. Computer 35, 103\u2013105 (2002)","journal-title":"Computer"},{"key":"47_CR2","unstructured":"Finder, I.: Data Loss Prevention: Data-at-Rest vs. Data-in-Motion, white paper, Identity Finder, LLC (2009)"},{"key":"47_CR3","unstructured":"SNIA Security Technical Work Group: Encryption of Data-at-Rest, Tech. Rep. Storage Networking Industry Association (2009)"},{"issue":"5","key":"47_CR4","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"JA Halderman","year":"2009","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM. 52(5), 91\u201398 (2009)","journal-title":"Commun. ACM."},{"key":"47_CR5","unstructured":"Mackey, C.D., Kurdziel, M.T.: Secure processing device with keystream cache and related methods. Patent Application 20100299537, Harris Corporation (2010)"},{"key":"47_CR6","unstructured":"National Institute of Standards and Technology (NIST): Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication, pp. 197, Washinton, D.C., (2001)"},{"key":"47_CR7","unstructured":"Yan, C., Rogers, B., Englender, D., Solihin, D., Prvulovic, M.: Improving cost, performance, and security of memory encryption and authentication. In: 33rd International Symposium on Computer Architecture, 2006. ISCA \u201906, pp. 179\u2013190 (2006)"},{"key":"47_CR8","unstructured":"McGrew, D.A., Viega, J.: The Galois\/counter mode of operation (GCM) (Submission to NIST Modes of Operation Process) (2005)"},{"key":"47_CR9","unstructured":"Zhou, G., Michalik, H., Hinsenkamp, L.: Efficient and High-Throughput Implementations of AES-GCM on FPGAs. In: International Conference on Field-Programmable Technology, 2007. ICFPT 2007, pp. 185\u2013192 (2007)"},{"key":"47_CR10","unstructured":"Vaslin, R., Gogniat, G., Diguet, J.-P., Tessier, R., Burleson, W.: Low latency solution for confidentiality and integrity checking in embedded systems with off-chip memory. In: ReCoSoc proceeedings 2007 Reconfigurable communication-centric Socs (2007)"},{"key":"47_CR11","unstructured":"Vaslin, R., Gogniat, G., Diguet, J.-P., Tessier, R., Unnikrishnan, D., Gaj, K.: Memory security management for reconfigurable embedded systems. In: International Conference on ICECE Technology, 2008. FPT 2008, pp. 153\u2013160 (2008)"},{"key":"47_CR12","unstructured":"Liu, Z., Huo, W., Zou, X., Lin, Y.: A lightweight memory encryption cache design and implementation for embedded processor. In: Proceedings of the 2009 12th International Symposium on Integrated circuits. ISIC \u201909, pp. 57\u201360 (2009)"},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Suh, G.E, Clarke, D., Gassend, B., Dijk, M. v, Devadas, S.. Efficient memory integrity verification and encryption for secure processors. In: Proceedings of the 36th annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36, pp. 339\u2013350. Washington, IEEE Computer Society (2003)","DOI":"10.1109\/MICRO.2003.1253207"},{"key":"47_CR14","unstructured":"DeepCover Secure Microcontroller with ARM926EJ-S Processor Core. http:\/\/www.maximintegrated.com\/datasheet\/index.mvp\/id\/7538"},{"key":"47_CR15","unstructured":"DeepCover Secure Microcontroller with Rapid Zeroization Technology and Cryptography. http:\/\/www.maximintegrated.com\/datasheet\/index.mvp\/id\/5815"},{"key":"47_CR16","unstructured":"DeepCover Secure Microcontroller with USB, Hardware, and Cryptography. http:\/\/www.maximintegrated.com\/datasheet\/index.mvp\/id\/7277"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation, Methods and Techniques. Tech. Rep., pp. 800\u201338A. National Institute of Standards and Technology (2001)","DOI":"10.6028\/NIST.SP.800-38a"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-013-0047-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-013-0047-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-013-0047-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T18:29:31Z","timestamp":1745951371000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-013-0047-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,26]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["47"],"URL":"https:\/\/doi.org\/10.1007\/s13389-013-0047-5","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2013,1,26]]}}}