{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:30:25Z","timestamp":1774801825467,"version":"3.50.1"},"reference-count":28,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[1999,4,1]],"date-time":"1999-04-01T00:00:00Z","timestamp":922924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[1999,4]]},"DOI":"10.1016\/s1389-1286(98)00019-x","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:57:10Z","timestamp":1027652230000},"page":"831-860","source":"Crossref","is-referenced-by-count":141,"title":["Building a high-performance, programmable secure coprocessor"],"prefix":"10.1016","volume":"31","author":[{"given":"Sean W","family":"Smith","sequence":"first","affiliation":[]},{"given":"Steve","family":"Weingart","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(98)00019-X_BIB1","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1147\/sj.302.0206","article-title":"Transaction security systems","volume":"30","author":"Abraham","year":"1991","journal-title":"IBM Systems Journal"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB2","unstructured":"R. Anderson, M. Kuhn, Tamper resistance \u2013 a cautionary note, 2nd USENIX Workshop on Electronic Commerce, November 1996."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB3","doi-asserted-by":"crossref","unstructured":"R. Anderson, M. Kuhn, Low cost attacks on tamper resistant devices, Preprint, 1997.","DOI":"10.1007\/BFb0028165"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB4","doi-asserted-by":"crossref","unstructured":"W.A. Arbaugh, D.J. Farber, J.M. Smith, A secure and reliable bootstrap architecture, IEEE Computer Society Conf. on Security and Privacy, 1997.","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB5","unstructured":"D.E. Bell, L.J. LaPadula, Secure computer systems: mathematical foundations and model, Technical Report M74-244, MITRE, May 1973."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB6","unstructured":"E. Biham, A. Shamir, Differential fault analysis: a new cryptanalytic attack on secret key cryptosystems, Preprint, 1997."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB7","unstructured":"D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of checking computations, Preprint, 1996."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB8","unstructured":"D. Chaum, Design concepts for tamper responding systems, CRYPTO 83."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB9","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/188280.188371","article-title":"BITS: a smartcard protected operating system","volume":"37","author":"Clark","year":"1994","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB10","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","article-title":"A lattice model of secure information flow","volume":"19","author":"Denning","year":"1976","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB11","unstructured":"W. Havener, R. Medlock, R. Mitchell, R. Walcott, Derived test requirements for FIPS PUB 140-1, National Institute of Standards and Technology, March 1995."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB12","unstructured":"IBM PCI Cryptographic Coprocessor, Product Brochure G325-1118, August 1997."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB13","doi-asserted-by":"crossref","unstructured":"M.F. Jones, B. Schneier, Securing the World Wide Web: smart tokens and their implementation, 4th Int. World Wide Web Conf., December 1995.","DOI":"10.1145\/3592626.3592658"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB14","unstructured":"National Institute of Standards and Technology, Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publication 140-1, 1994."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB15","unstructured":"E.R. Palmer, An introduction to Citadel \u2013 a secure crypto coprocessor for workstations, Computer Science Research Report RC 18373, IBM T.J. Watson Research Center, September 1992."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB16","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1145\/361268.361275","article-title":"A hardware architecture for implementing protection rings","volume":"15","author":"Schroeder","year":"1972","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB17","unstructured":"S.W. Smith, Secure coprocessing applications and research issues, Los Alamos Unclassified Release LA-UR-96-2805, Los Alamos National Laboratory, August 1996."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB18","unstructured":"S.W. Smith, V. Austel, Trusting trusted hardware: towards a formal model for programmable secure coprocessors, 3rd USENIX Workshop on Electronic Commerce, September 1998."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB19","unstructured":"S.W. Smith, S.M. Matyas, Authentication for secure devices with limited cryptography, IBM T.J. Watson Research Center, Design notes, August 1997."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB20","doi-asserted-by":"crossref","unstructured":"S.W. Smith, E.R. Palmer, S.H. Weingart, Using a high-performance, programmable secure coprocessor, Proc. 2nd Int. Conf. on Financial Cryptography, Springer, Berlin, 1998.","DOI":"10.1007\/BFb0055474"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB21","unstructured":"J.D. Tygar, B.S. Yee, Dyad: A system for using physically secure coprocessors, Proc. Joint Harvard\u2013MIT Workshop on Technological Strategies for the Protection of Intellectual Property in the Network Multimedia Environment, April 1993."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB22","doi-asserted-by":"crossref","unstructured":"S.H. Weingart, Physical security for the \u03bcABYSS system, IEEE Computer Society Conf. on Security and Privacy, 1987.","DOI":"10.1109\/SP.1987.10019"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB23","doi-asserted-by":"crossref","unstructured":"S.R. White, L.D. Comerford, ABYSS: a trusted architecture for software protection, IEEE Computer Society Conf. on Security and Privacy, 1987.","DOI":"10.1109\/SP.1987.10021"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB24","unstructured":"S.R. White, S.H. Weingart, W.C. Arnold, E.R. Palmer, Introduction to the Citadel architecture: security in physically exposed environments, Technical Report RC 16672, Distributed Systems Security Group, IBM T.J. Watson Research Center, March 1991."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB25","doi-asserted-by":"crossref","unstructured":"S.H. Weingart, S.R. White, W.C. Arnold, G.P. Double, An evaluation system for the physical security of computing systems, 6th Annual Computer Security Applications Conf., 1990.","DOI":"10.1109\/CSAC.1990.143780"},{"key":"10.1016\/S1389-1286(98)00019-X_BIB26","unstructured":"B.S. Yee, Using secure coprocessors, Ph.D. Thesis, Computer Science Technical Report CMU-CS-94-149, Carnegie Mellon University, May 1994."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB27","unstructured":"B.S. Yee, J.D. Tygar, Secure coprocessors in electronic commerce applications, 1st USENIX Workshop on Electronic Commerce, July 1995."},{"key":"10.1016\/S1389-1286(98)00019-X_BIB28","doi-asserted-by":"crossref","unstructured":"A. Young, M. Yung, The dark side of black-box cryptography \u2013 or \u2013 should we trust Capstone? CRYPTO 1996, LNCS 1109.","DOI":"10.1007\/3-540-68697-5_8"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912869800019X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912869800019X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T11:22:09Z","timestamp":1704194529000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S138912869800019X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,4]]},"references-count":28,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1999,4]]}},"alternative-id":["S138912869800019X"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(98)00019-x","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[1999,4]]}}}