{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:52Z","timestamp":1750307692016,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456455.1456461","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"31-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A fast real-time memory authentication protocol"],"prefix":"10.1145","author":[{"given":"Yin","family":"Hu","sequence":"first","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]},{"given":"Ghaith","family":"Hammouri","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]},{"given":"Berk","family":"Sunar","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.80"},{"key":"e_1_3_2_1_2_1","volume-title":"Merkle. Protocols for Public Key Cryptosystems. Proceedings of the 1980 IEEE Symposium on Security and Privacy","author":"Ralph","year":"1980","unstructured":"Ralph C. Merkle. Protocols for Public Key Cryptosystems. Proceedings of the 1980 IEEE Symposium on Security and Privacy , 1980 . Ralph C. Merkle. Protocols for Public Key Cryptosystems. Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.22"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_12"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/822080.822806"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Clarke D.","year":"2005","unstructured":"D. Clarke , G. E. Suh , B. Gassend , A. Sudan , M. van Dijk and S. Devadas, Toward Constant Bandwidth Overhead Memory Integrity Verification , Proceedings of the IEEE Symposium on Security and Privacy , May 2005 . D. Clarke, G. E. Suh, B. Gassend, A. Sudan, M. van Dijk and S. Devadas, Toward Constant Bandwidth Overhead Memory Integrity Verification, Proceedings of the IEEE Symposium on Security and Privacy, May 2005."},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science, No. 839","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/3-540-48658-5_22","volume-title":"Shafi Goldwasser. Incremental Cryptography: The Case of Hashing and Signing In Advances in Cryptology -- CRYPTO'94","author":"Bellare Mihir","year":"1994","unstructured":"Mihir Bellare , Oded Goldreich , Shafi Goldwasser. Incremental Cryptography: The Case of Hashing and Signing In Advances in Cryptology -- CRYPTO'94 , Lecture Notes in Computer Science, No. 839 , pages 216 -- 233 . Springer-Verlag , 1994 . Mihir Bellare, Oded Goldreich, Shafi Goldwasser. Incremental Cryptography: The Case of Hashing and Signing In Advances in Cryptology -- CRYPTO'94, Lecture Notes in Computer Science, No. 839, pages 216--233. Springer-Verlag, 1994."},{"volume-title":"Advances in Cryptology -- CRYPTO '99","author":"Black J.","key":"e_1_3_2_1_9_1","unstructured":"J. Black , S. Halevi , H. Krawczyk , T. Krovetz , P. Rogaway . UMAC: Fast and Secure Message Authentication . In Advances in Cryptology -- CRYPTO '99 J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway. UMAC: Fast and Secure Message Authentication. In Advances in Cryptology -- CRYPTO '99"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.170"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.195"},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","first-page":"79","volume-title":"Advances in Cryptology -- CRYPTO '82","author":"Brassard G.","year":"1983","unstructured":"G. Brassard . On computationally secure authentication tags requiring short secret shared keys . In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology -- CRYPTO '82 , Lecture Notes in Computer Science , pages 79 -- 86 , New York, 1983 . Springer-Verlag . G. Brassard. On computationally secure authentication tags requiring short secret shared keys. In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology -- CRYPTO '82, Lecture Notes in Computer Science, pages 79--86, New York, 1983. Springer-Verlag."},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-48405-1_15","volume-title":"Advances in Cryptology -- CRYPTO '99","author":"Etzel M.","year":"1999","unstructured":"M. Etzel , S. Patel , and Z. Ramzan . SQUARE HASH: Fast message authentication via optimized universal hash functions . In M. Wiener, editor, Advances in Cryptology -- CRYPTO '99 , volume 1666 of Lecture Notes in Computer Science , pages 234 -- 251 , New York, 1999 . Springer-Verlag . M. Etzel, S. Patel, and Z. Ramzan. SQUARE HASH: Fast message authentication via optimized universal hash functions. In M. Wiener, editor, Advances in Cryptology -- CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 234--251, New York, 1999. Springer-Verlag."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/647932.740723"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313558"},{"key":"e_1_3_2_1_16_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology -- CRYPTO '94","author":"Krawczyk H.","year":"1994","unstructured":"H. Krawczyk . LFSR-based hashing and authentication . In Advances in Cryptology -- CRYPTO '94 , volume 839 of Lecture Notes in Computer Science , pages 129 -- 139 . Springer-Verlag , 1994 . H. Krawczyk. LFSR-based hashing and authentication. In Advances in Cryptology -- CRYPTO '94, volume 839 of Lecture Notes in Computer Science, pages 129--139. Springer-Verlag, 1994."},{"key":"e_1_3_2_1_17_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/3-540-49264-X_24","volume-title":"EUROCRYPT'95","author":"Krawczyk H.","year":"1995","unstructured":"H. Krawczyk . New hash functions for message authentication. In EUROCRYPT'95 , volume 921 of Lecture Notes in Computer Science , pages 301 -- 310 . Springer-Verlag , 1995 . H. Krawczyk. New hash functions for message authentication. In EUROCRYPT'95, volume 921 of Lecture Notes in Computer Science, pages 301--310. Springer-Verlag, 1995."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100246"},{"key":"e_1_3_2_1_19_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/3-540-48910-X_3","volume-title":"EUROCRYPT'99","author":"Nevelsteen W.","year":"1999","unstructured":"W. Nevelsteen and B. Preneel . Software performance of universal hash functions . In EUROCRYPT'99 , volume 1592 of Lecture Notes in Computer Science , pages 24 -- 41 , Berlin, 1999 . Springer-Verlag . W. Nevelsteen and B. Preneel. Software performance of universal hash functions. In EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, pages 24--41, Berlin, 1999. Springer-Verlag."},{"key":"e_1_3_2_1_20_1","series-title":"Lecture Notes in Computer Science","first-page":"74","volume-title":"Advances in Cryptology -- CRYPTO '96","author":"Shoup V.","year":"1996","unstructured":"V. Shoup . On fast and provably secure message authentication based on universal hashing. In Advances in Cryptology -- CRYPTO '96 , volume 1109 of Lecture Notes in Computer Science , pages 74 -- 85 , New York, 1996 . Springer-Verlag . V. Shoup. On fast and provably secure message authentication based on universal hashing. In Advances in Cryptology -- CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 74--85, New York, 1996. Springer-Verlag."},{"key":"e_1_3_2_1_21_1","series-title":"LNCS","first-page":"29","volume-title":"Proceedings Crypto '95","author":"Rogaway P.","year":"1995","unstructured":"P. Rogaway . Bucket hashing and its application to fast message authetication. In D. Coppersmith, editor, Proceedings Crypto '95 , volume 963 of LNCS , pages 29 -- 42 . Springer-Verlag , 1995 . P. Rogaway. Bucket hashing and its application to fast message authetication. In D. Coppersmith, editor, Proceedings Crypto '95, volume 963 of LNCS, pages 29--42. Springer-Verlag, 1995."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"e_1_3_2_1_24_1","volume-title":"Exploiting Online Games: Cheating Massively Distributed Systems","author":"Hoglund G.","year":"2007","unstructured":"G. Hoglund and G. McGraw . Exploiting Online Games: Cheating Massively Distributed Systems . Addison-Wesley Professional , 2007 . G. Hoglund and G. McGraw. Exploiting Online Games: Cheating Massively Distributed Systems. Addison-Wesley Professional, 2007."},{"key":"e_1_3_2_1_25_1","volume-title":"January","volume":"15","author":"David","year":"2004","unstructured":"David A. McGrew and John Viega The Galois\/Counter Mode of Operation (GCM) Submission to NIST Modes of Operation Process , January , volume 15 , 2004 . David A. McGrew and John Viega The Galois\/Counter Mode of Operation (GCM) Submission to NIST Modes of Operation Process, January, volume 15, 2004."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 3rd ACM workshop on Scalable trusted computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456455.1456461","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456455.1456461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456455.1456461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":24,"alternative-id":["10.1145\/1456455.1456461","10.1145\/1456455"],"URL":"https:\/\/doi.org\/10.1145\/1456455.1456461","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}