{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:37:06Z","timestamp":1730201826342,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/cases.2013.6662530","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T16:53:08Z","timestamp":1385571188000},"page":"1-10","source":"Crossref","is-referenced-by-count":10,"title":["An efficient run-time encryption scheme for non-volatile main memory"],"prefix":"10.1109","author":[{"given":"Xian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Guangyu","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Di","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2011.5722186"},{"key":"17","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/1080695.1069972","article-title":"High efficiency counter mode security architecture via prediction and precomputation","author":"shi","year":"2005","journal-title":"Proceedings of the 32nd Annual International Symposium on Computer Architecture ISCA '05"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2009.4798259"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.16"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816014"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416645"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669117"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555758"},{"key":"12","first-page":"513","article-title":"Luby-rackoff: 7 rounds are enough for 2n(1-?) security","author":"patarin","year":"2003","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555759"},{"key":"3","first-page":"1","volume":"39","author":"binkert","year":"2011","journal-title":"The gem5 Simulator"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555761"},{"year":"2013","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544298"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2185930"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1979.11256"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669157"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000086"},{"key":"9","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems","author":"kocher","year":"1996","journal-title":"Adv Cryptol"},{"key":"8","first-page":"1105","article-title":"Advances in memory technology","author":"kim","year":"2006","journal-title":"Proceedings of the 32nd International Conference on Very Large Data Bases VLDB '06"}],"event":{"name":"2013 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES)","start":{"date-parts":[[2013,9,29]]},"location":"Montreal, QC","end":{"date-parts":[[2013,10,4]]}},"container-title":["2013 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6648478\/6662498\/06662530.pdf?arnumber=6662530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T16:29:30Z","timestamp":1580920170000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6662530\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cases.2013.6662530","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}