Sciweavers

126 search results - page 26 / 26
» SMASH - A Cryptographic Hash Function
Sort
View
CCS
2007
ACM
13 years 11 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee