{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:21Z","timestamp":1767339801561,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523656","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"149-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["PRIME"],"prefix":"10.1145","author":[{"given":"Behrad","family":"Garmany","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum, Germany"}]},{"given":"Tilo","family":"M\u00fcller","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander University, Erlangen-Nuremberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1266999"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce -","volume":"2","author":"Anderson R.","year":"1996"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_2"},{"volume-title":"Proceedings of the Annual CanSecWest Applied Security Conference","year":"2005","author":"Becher M.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1983.1676262"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420961"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647094.716698"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.010"},{"key":"e_1_3_2_1_10_1","first-page":"431","volume-title":"Cryptographic Engineering","author":"Colin W. D.","year":"2009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/112331.112358"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1457838.1457864"},{"key":"e_1_3_2_1_13_1","first-page":"4","volume-title":"Proceedings of the 10th Conference on USENIX Security Symposium -","volume":"10","author":"Gutmann P.","year":"2001"},{"key":"e_1_3_2_1_14_1","first-page":"45","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Halderman J. A.","year":"2008"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Intel. Intel Advanced Encryption Standard (AES) Instructions Set Jan. 2010.  Intel. Intel Advanced Encryption Standard (AES) Instructions Set Jan. 2010."},{"volume-title":"Intel Corporation","year":"2011","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"International Telecommunication Union. Information Technology --- ASN.1 Encoding Rules --- Specification of Basic Encoding Rules (BER) Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). ITU-T Recommendation X.690 July 2002.  International Telecommunication Union. Information Technology --- ASN.1 Encoding Rules --- Specification of Basic Encoding Rules (BER) Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). ITU-T Recommendation X.690 July 2002."},{"key":"e_1_3_2_1_19_1","unstructured":"J\u00fcrgen Pabel. Frozen Cache. http:\/\/frozenchache.blogspot.com\/ Jan. 2009.  J\u00fcrgen Pabel. Frozen Cache. http:\/\/frozenchache.blogspot.com\/ Jan. 2009."},{"key":"e_1_3_2_1_20_1","unstructured":"T. Klein. All Your Private Keys are Belong to Us 2006. URL: http:\/\/www.trapkit.de\/research\/sslkeyfinder\/keyfinder_v1.0_20060205.pdf.  T. Klein. All Your Private Keys are Belong to Us 2006. URL: http:\/\/www.trapkit.de\/research\/sslkeyfinder\/keyfinder_v1.0_20060205.pdf."},{"volume-title":"Inc.","year":"1997","author":"Knuth D. E.","key":"e_1_3_2_1_21_1"},{"volume-title":"Inc.","year":"1994","author":"Ko\u00e7 K.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.502403"},{"volume-title":"Intel Corporation","year":"2011","author":"Lomont C.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1985-0777282-X"},{"key":"e_1_3_2_1_26_1","first-page":"17","volume-title":"TRESOR Runs Encryption Securely Outside RAM. In 20th USENIX Security Symposium","author":"M\u00fcller T.","year":"2011"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_5"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14597-1_3"},{"volume-title":"Proceedings of BSDCan 2005","year":"2005","author":"Percival C.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","first-page":"36","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium","author":"Rahmati A.","year":"2012"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076743"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '13"},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523656","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523656"}},"subtitle":["private RSA infrastructure for memory-less encryption"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":30,"alternative-id":["10.1145\/2523649.2523656","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523656","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}