{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T19:01:23Z","timestamp":1725390083664},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/efta.2007.4416828","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T15:59:03Z","timestamp":1199462343000},"page":"632-637","source":"Crossref","is-referenced-by-count":0,"title":["Using value locality to reduce memory encryption overhead in embedded processors"],"prefix":"10.1109","author":[{"given":"G.","family":"Keramidas","sequence":"first","affiliation":[]},{"given":"P.","family":"Petoumenos","sequence":"additional","affiliation":[]},{"given":"A.","family":"Antonopoulos","sequence":"additional","affiliation":[]},{"given":"S.","family":"Kaxiras","sequence":"additional","affiliation":[]},{"given":"D.N.","family":"Serpanos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Unlocking the design secrets of a 2.29 gb\/s Rijndael processor","author":"schaumont","year":"2002","journal-title":"Design Automation Conference"},{"key":"ref11","article-title":"Architectural optimization for a 1.82 gb\/s VLSI implementation of the AES Rijndael algorithm","author":"kuo","year":"2001","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646128"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/237090.237173"},{"key":"ref14","article-title":"Silent stores for free","author":"lepak","year":"2000","journal-title":"International Symposium on Microarchitecture"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/605397.605401","article-title":"Temporally silent stores","author":"lepak","year":"2002","journal-title":"International Conference on Architectural Support for Programming Languages and Operating Systems"},{"key":"ref16","article-title":"Evaluating Dusty Caches on General Workloads","author":"krishnamurthy","year":"2006","journal-title":"Workshop on Duplicating Deconstructing and Debunking"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1145\/1150019.1136502","article-title":"Improving Cost, Performance, and Security of Memory Encryption and Authentication","author":"yan","year":"2006","journal-title":"International Symposium on Computer Architecture"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2000.842295"},{"key":"ref19","article-title":"MiBench: A free, commercially representative embedded benchmark suite","author":"guthaus","year":"2002","journal-title":"Workshop on Workload Characterization"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253207"},{"journal-title":"Hacking the Xbox An Introduction to Reverse Engineering","year":"2003","author":"huang","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1109\/MICRO.2003.1253209","article-title":"Fast Secure Processor for Inhibiting Software Piracy and Tampering","author":"yang","year":"2003","journal-title":"International Symposium on Microarchitecture"},{"key":"ref8","article-title":"Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems","author":"shi","year":"2004","journal-title":"International Conference on Parallel Architectures and Compilation Techniques"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1145\/1080695.1069972","article-title":"High efficiency counter mode security architecture via prediction and precomputation","author":"shi","year":"2005","journal-title":"International Symposium on Computer Architecture"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.14"},{"key":"ref1","article-title":"Architectural Support for Copy and Tamper Resistant Software","author":"lie","year":"2000","journal-title":"International Conference on Architectural Support for Programming Languages and Operating Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.31"}],"event":{"name":"2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007)","start":{"date-parts":[[2007,9,25]]},"location":"Patras, Greece","end":{"date-parts":[[2007,9,28]]}},"container-title":["2007 IEEE Conference on Emerging Technologies &amp; Factory Automation (EFTA 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4416742\/4416743\/04416828.pdf?arnumber=4416828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T22:40:36Z","timestamp":1497739236000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4416828\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/efta.2007.4416828","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}