{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:19Z","timestamp":1750307779090,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T00:00:00Z","timestamp":1193961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,2]]},"DOI":"10.1145\/1314354.1314360","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"15-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["Reconfigurable trusted computing in hardware"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Eisenbarth","sequence":"first","affiliation":[{"name":"Ruhr-University of Bochum"}]},{"given":"Tim","family":"G\u00fcneysu","sequence":"additional","affiliation":[{"name":"Ruhr-University of Bochum"}]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[{"name":"Ruhr-University of Bochum"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Ruhr-University of Bochum"}]},{"given":"Dries","family":"Schellekens","sequence":"additional","affiliation":[{"name":"K.U. Leuven: ESAT\/COSIC"}]},{"given":"Marko","family":"Wolf","sequence":"additional","affiliation":[{"name":"Ruhr-University of Bochum"}]}],"member":"320","published-online":{"date-parts":[[2007,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Actel Corporation. IGLOO and ProASIC Flash-based FPGAs. www.actel.com\/products\/.  Actel Corporation. IGLOO and ProASIC Flash-based FPGAs. www.actel.com\/products\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Altera. Stratix II and Stratix II GX FPGAs. www.altera.com\/products\/devices\/.  Altera. Stratix II and Stratix II GX FPGAs. www.altera.com\/products\/devices\/."},{"key":"e_1_3_2_1_3_1","volume-title":"TrustZone: Integrated Hardware and Software Security","author":"Alves T.","year":"2004","unstructured":"Alves , T. , and Felton , D . TrustZone: Integrated Hardware and Software Security . In ARM Inc. White Paper ( 2004 ). Alves, T., and Felton, D. TrustZone: Integrated Hardware and Software Security. In ARM Inc. White Paper (2004)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/647096.716997"},{"key":"e_1_3_2_1_5_1","volume-title":"WUJNS","author":"Bo Z.","year":"2007","unstructured":"Bo , Z. , Huanguo , Z. , and Rui , H . A New Approach of TPM Construction Based on J2810 . In WUJNS ( 2007 ). Bo, Z., Huanguo, Z., and Rui, H. A New Approach of TPM Construction Based on J2810. In WUJNS (2007)."},{"key":"e_1_3_2_1_6_1","volume-title":"CRASH","author":"Brizek J.","year":"2005","unstructured":"Brizek , J. , Khan , M. , Seifert , J.-P. , and Wheeler , D . A Platform-level Trust-Architecture for Hand-held Devices . In CRASH ( 2005 ). Brizek, J., Khan, M., Seifert, J.-P., and Wheeler, D. A Platform-level Trust-Architecture for Hand-held Devices. In CRASH (2005)."},{"key":"e_1_3_2_1_7_1","volume-title":"ASIACRYPT","author":"Canni\u00e8re C. D.","year":"2006","unstructured":"Canni\u00e8re , C. D. , and Rechberger , C . Finding SHA-1 characteristics . In ASIACRYPT ( 2006 ). Canni\u00e8re, C. D., and Rechberger, C. Finding SHA-1 characteristics. In ASIACRYPT (2006)."},{"key":"e_1_3_2_1_8_1","unstructured":"Common Criteria Project. Common Criteria and Common Evaluation Methodology Version 3.1. www.commoncriteriaportal.org.  Common Criteria Project. Common Criteria and Common Evaluation Methodology Version 3.1. www.commoncriteriaportal.org."},{"key":"e_1_3_2_1_9_1","first-page":"2","author":"De Vries A.","year":"2007","unstructured":"De Vries , A. , and Ma , Y. A Logical Approach to NVM Integration in SOC Design. EDN 2 ( 2007 ). De Vries, A., and Ma, Y. A Logical Approach to NVM Integration in SOC Design. EDN 2 (2007).","journal-title":"NVM Integration in SOC Design. EDN"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1764631.1764639"},{"key":"e_1_3_2_1_11_1","volume-title":"RSA & Public Key Cryptography in FPGAs. Tech. rep","author":"Fry J.","year":"2005","unstructured":"Fry , J. , and Langhammer , M . RSA & Public Key Cryptography in FPGAs. Tech. rep ., Altera Corporation , 2005 . Fry, J., and Langhammer, M. RSA & Public Key Cryptography in FPGAs. Tech. rep., Altera Corporation, 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"CHES","author":"Guajardo J.","year":"2007","unstructured":"Guajardo , J. , Kumar , S. , Schrijen , G.-J. , and Tuyls , P . FPGA intrinsic PUFs and their use for IP protection . In CHES ( 2007 ). Guajardo, J., Kumar, S., Schrijen, G.-J., and Tuyls, P. FPGA intrinsic PUFs and their use for IP protection. In CHES (2007)."},{"key":"e_1_3_2_1_13_1","unstructured":"Helion. SHA-1 Cores. www.heliontech.com.  Helion. SHA-1 Cores. www.heliontech.com."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/968280.968292"},{"key":"e_1_3_2_1_15_1","volume-title":"CHES","author":"K\u00fchn U.","year":"2005","unstructured":"K\u00fchn , U. , Kursawe , K. , Lucks , S. , Sadeghi , A.-R. , and St\u00fcble , C . Secure data management in trusted computing . In CHES ( 2005 ). K\u00fchn, U., Kursawe, K., Lucks, S., Sadeghi, A.-R., and St\u00fcble, C. Secure data management in trusted computing. In CHES (2005)."},{"key":"e_1_3_2_1_16_1","volume-title":"CRASH","author":"Kursawe K.","year":"2005","unstructured":"Kursawe , K. , Schellekens , D. , and Preneel , B . Analyzing trusted platform communication . In CRASH ( 2005 ). Kursawe, K., Schellekens, D., and Preneel, B. Analyzing trusted platform communication. In CRASH (2005)."},{"key":"e_1_3_2_1_17_1","volume-title":"EUROCRYPT","author":"Lai X.","year":"1992","unstructured":"Lai , X. , and Massey , J. L . Hash function based on block ciphers . In EUROCRYPT ( 1992 ). Lai, X., and Massey, J. L. Hash function based on block ciphers. In EUROCRYPT (1992)."},{"key":"e_1_3_2_1_18_1","first-page":"2","author":"Lilian Bossuet","year":"2006","unstructured":"Lilian Bossuet , Guy Gogniat, W. B. Dynamically configurable Security for SRAM FPGA Bitstreams. International Journal of Embedded Systems 2 , ( 2006 ). Lilian Bossuet, Guy Gogniat, W. B. Dynamically configurable Security for SRAM FPGA Bitstreams. International Journal of Embedded Systems 2, (2006).","journal-title":"Security for SRAM FPGA Bitstreams. International Journal of Embedded Systems"},{"key":"e_1_3_2_1_19_1","volume-title":"April","author":"Microsoft Corporation","year":"2006","unstructured":"Microsoft Corporation . Bitlocker drive encryption: Technical overview , April 2006 . www.microsoft.com\/technet\/windowsvista\/security\/bittech.mspx. Microsoft Corporation. Bitlocker drive encryption: Technical overview, April 2006. www.microsoft.com\/technet\/windowsvista\/security\/bittech.mspx."},{"key":"e_1_3_2_1_20_1","volume-title":"Recommendation for block cipher modes of operation - the CMAC mode for authentication. NIST Special Publication SP 800--38B","author":"National Institute of Standards and Technology (NIST).","year":"2005","unstructured":"National Institute of Standards and Technology (NIST). Recommendation for block cipher modes of operation - the CMAC mode for authentication. NIST Special Publication SP 800--38B , 2005 . National Institute of Standards and Technology (NIST). Recommendation for block cipher modes of operation - the CMAC mode for authentication. NIST Special Publication SP 800--38B, 2005."},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Security Symposium","author":"Sailer R.","year":"2004","unstructured":"Sailer , R. , Zhang , X. , Jaeger , T. , and van Doorn , L. Design and Implementation of a TCG-based Integrity Measurement Architecture . In USENIX Security Symposium ( 2004 ). Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. Design and Implementation of a TCG-based Integrity Measurement Architecture. In USENIX Security Symposium (2004)."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of IEEE Security in Storage Workshop","author":"Samyde D.","year":"2002","unstructured":"Samyde , D. , Skorobogatov , S. , Anderson , R. , and Quisquater , J . -J. On a new way to read data from memory . Proceedings of IEEE Security in Storage Workshop ( 2002 ). Samyde, D., Skorobogatov, S., Anderson, R., and Quisquater, J.-J. On a new way to read data from memory. Proceedings of IEEE Security in Storage Workshop (2002)."},{"key":"e_1_3_2_1_23_1","volume-title":"CHES","author":"Simpson E.","year":"2006","unstructured":"Simpson , E. , and Schaumont , P . Offline hardware\/software authentication for reconfigurable platforms . In CHES ( 2006 ). Simpson, E., and Schaumont, P. Offline hardware\/software authentication for reconfigurable platforms. In CHES (2006)."},{"key":"e_1_3_2_1_24_1","unstructured":"The Trusted Computing Group (TCG). www.trustedcomputinggroup.org.  The Trusted Computing Group (TCG). www.trustedcomputinggroup.org."},{"key":"e_1_3_2_1_25_1","unstructured":"Xilinx. Spartan-3 and Virtex FPGAs. www.xilinx.com\/products\/silicon_solutions\/.  Xilinx. Spartan-3 and Virtex FPGAs. www.xilinx.com\/products\/silicon_solutions\/."},{"key":"e_1_3_2_1_26_1","first-page":"94","author":"Zambreno J.","year":"2006","unstructured":"Zambreno , J. , Honbo , D. , Choudhary , A. , Simha , R. , and Narahar , B. High -performance software protection using reconfigurable architectures. IEEE 94 ( 2006 ). Zambreno, J., Honbo, D., Choudhary, A., Simha, R., and Narahar, B. High-performance software protection using reconfigurable architectures. IEEE 94 (2006).","journal-title":"IEEE"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Scalable trusted computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314354.1314360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314354.1314360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314354.1314360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,2]]},"references-count":26,"alternative-id":["10.1145\/1314354.1314360","10.1145\/1314354"],"URL":"https:\/\/doi.org\/10.1145\/1314354.1314360","relation":{},"subject":[],"published":{"date-parts":[[2007,11,2]]},"assertion":[{"value":"2007-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}