Secure cryptoprocessor

Results: 19



#Item
11The TrustNo 1 Cryptoprocessor Concept Markus Kuhn — [removed] — [removed]Abstract: Cryptoprocessors feature an on-chip block cipher hardware between the cache and the bus interface. Code and data are decry

The TrustNo 1 Cryptoprocessor Concept Markus Kuhn — [removed] — [removed]Abstract: Cryptoprocessors feature an on-chip block cipher hardware between the cache and the bus interface. Code and data are decry

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-06 07:11:39
12M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]Low Cost Attacks on Tamper Resistant Devices Ross

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]Low Cost Attacks on Tamper Resistant Devices Ross

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
13A304-medea+ (LO2[removed]:05

A304-medea+ (LO2[removed]:05

Add to Reading List

Source URL: www.catrene.org

Language: English - Date: 2009-03-25 10:36:32
14IBM 4758 Model 23 Security Policy Secure Systems and Smart Cards Group IBM T.J. Watson Research Center June 15, [removed]Scope of Document

IBM 4758 Model 23 Security Policy Secure Systems and Smart Cards Group IBM T.J. Watson Research Center June 15, [removed]Scope of Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
15CHAPTER  18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
16Cyber-Rights & Cyber-Liberties (UK)  Control of Processor Security Features Could New Chip Privacy and Security Measures Tie Users’ Hands? A New Report By Cyber-Rights & Cyber-Liberties (UK), June 1999

Cyber-Rights & Cyber-Liberties (UK) Control of Processor Security Features Could New Chip Privacy and Security Measures Tie Users’ Hands? A New Report By Cyber-Rights & Cyber-Liberties (UK), June 1999

Add to Reading List

Source URL: www.cyber-rights.org

Language: English - Date: 1999-07-06 10:49:28
17M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
18Technical Report  UCAM-CL-TR-641

Technical Report UCAM-CL-TR-641

Add to Reading List

Source URL: crysys.hu

Language: English - Date: 2007-07-03 06:15:02
19

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-04-08 09:15:29