咨询与建议

限定检索结果

文献类型

  • 8 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 2 篇 软件工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 4 篇 computer archite...
  • 4 篇 hardware
  • 3 篇 microprocessors
  • 2 篇 data security
  • 2 篇 registers
  • 2 篇 operating system...
  • 2 篇 instruction sets
  • 2 篇 protection
  • 2 篇 ip networks
  • 2 篇 cryptography
  • 1 篇 table lookup
  • 1 篇 parallel process...
  • 1 篇 scalability
  • 1 篇 rendering (compu...
  • 1 篇 public key crypt...
  • 1 篇 proposals
  • 1 篇 application soft...
  • 1 篇 military computi...
  • 1 篇 security of data
  • 1 篇 computer securit...

机构

  • 3 篇 princeton archit...
  • 2 篇 princeton archit...
  • 1 篇 princeton archit...
  • 1 篇 department of co...
  • 1 篇 princeton archit...
  • 1 篇 princeton archit...

作者

  • 5 篇 r.b. lee
  • 2 篇 a.m. fiskiran
  • 2 篇 j.p. mcgregor
  • 1 篇 lee ruby b.
  • 1 篇 dwoskin jeffrey
  • 1 篇 mcgregor john p.
  • 1 篇 zhenghong wang
  • 1 篇 kwan peter c.s.
  • 1 篇 z. shi
  • 1 篇 xiao yang
  • 1 篇 wang zhenghong
  • 1 篇 yao frances f.
  • 1 篇 murat fiskiran
  • 1 篇 p.c.s. kwan
  • 1 篇 d.k. karig
  • 1 篇 j. dwoskin
  • 1 篇 yin yiqun lisa
  • 1 篇 lee

语言

  • 8 篇 英文
检索条件"机构=Princeton Architecture Laboratory for Multimedia and Security"
8 条 记 录,以下是1-10 订阅
排序:
architecture for protecting critical secrets in microprocessors
Architecture for protecting critical secrets in microprocess...
收藏 引用
32nd Interntional Symposium on Computer architecture, ISCA 2005
作者: Lee, Ruby B. Kwan, Peter C.S. McGregor, John P. Dwoskin, Jeffrey Wang, Zhenghong Princeton Architecture Laboratory for Multimedia and Security Department of Electrical Engineering Princeton University NJ 08544 United States
We propose "secret-protected (SP)" architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of critical secrets, and key prote... 详细信息
来源: 评论
Design and analysis of password-based key derivation functions
Design and analysis of password-based key derivation functio...
收藏 引用
RSA Conference 2005
作者: Yao, Frances F. Yin, Yiqun Lisa Department of Computer Science City University of Hong Kong Kowloon Hong Kong Princeton Architecture Laboratory for Multimedia and Security Princeton University Princeton NJ 08544 United States
A password-based key derivation function (KDF) - a function that derives cryptographic keys from a password - is necessary in many security applications. Like any password-based schemes, such KDFs are subject to key s... 详细信息
来源: 评论
On-chip lookup tables for fast symmetric-key encryption
On-chip lookup tables for fast symmetric-key encryption
收藏 引用
International Conference on Application Specific Systems (ASAP), architectures and Processors
作者: A.M. Fiskiran R.B. Lee Princeton Architecture Laboratory for Multimedia and Security Department of Electrical Engineering Princeton University USA
On public communication networks such as the Internet, data confidentiality can be provided by symmetric key ciphers. One of the most common operations used in symmetric key ciphers are table lookups. These frequently... 详细信息
来源: 评论
architecture for protecting critical secrets in microprocessors
Architecture for protecting critical secrets in microprocess...
收藏 引用
Annual International Symposium on Computer architecture, ISCA
作者: R.B. Lee P.C.S. Kwan J.P. McGregor J. Dwoskin Zhenghong Wang Princeton Architecture Laboratory for Multimedia and Security Department of Electrical Engineering Princeton University NJ USA
We propose "secret-protected (SP)" architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of critical secrets, and key prote... 详细信息
来源: 评论
PLX FP: an efficient floating-point instruction set for 3D graphics
PLX FP: an efficient floating-point instruction set for 3D g...
收藏 引用
IEEE International Conference on multimedia and Expo (ICME)
作者: Xiao Yang R.B. Lee Princeton Architecture Laboratory for Multimedia and Security Princeton University USA
3D graphics is an important component in the workload of today's computing platforms. Many ISA extensions for 3D graphics have been proposed and implemented. We describe PLX FP, a new floating-point extension to t... 详细信息
来源: 评论
A processor architecture defense against buffer overflow attacks
A processor architecture defense against buffer overflow att...
收藏 引用
International Conference on Information Technology: Research and Education (ITRE)
作者: J.P. McGregor D.K. Karig Z. Shi R.B. Lee Princeton Architecture Laboratory for Multimedia and Security (PALMS) Department of Electrical Engineering Princeton University USA
Buffer overflow vulnerabilities in the memory stack continue to pose serious threats to network and computer security. By exploiting these vulnerabilities, a malicious party can strategically overwrite the return addr... 详细信息
来源: 评论
PLX: a fully subword-parallel instruction set architecture for fast scalable multimedia processing
PLX: a fully subword-parallel instruction set architecture f...
收藏 引用
IEEE International Conference on multimedia and Expo (ICME)
作者: R.B. Lee A.M. Fiskiran Princeton Architecture Laboratory for Multimedia and Security (PALMS) Princeton University USA
PLX is a small, fully subword-parallel instruction set architecture (ISA) designed for very fast multimedia processing, especially in constrained environments requiring low cost and power, such as handheld multimedia ... 详细信息
来源: 评论
Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments
Workload characterization of elliptic curve cryptography and...
收藏 引用
IEEE International Workshop/Symposium on Workload Characterization
作者: Murat Fiskiran Lee Princeton Architecture Laboratory for Multimedia and Security Department of Electrical Engineering Princeton University USA
In recent years, some cryptographic algorithms have gained popularity due to properties that make them suitable for use in constrained environments like mobile information appliances, where computing resources and pow... 详细信息
来源: 评论