2009
DOI: 10.1007/978-3-642-04474-8_34
|View full text |Cite
|
Sign up to set email alerts
|

MAC Precomputation with Applications to Secure Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…In many cases the available memory within T will not be sufficient to store D or intermediate values during evaluation of f . If needed, T might resort to additional (slow) secure external memory (e.g., [GKM09]). The token T could be instantiated with a cryptographic coprocessor built by a thirdparty manufacturer whom C trusts in a way that T does not leak any information to S. A possible candidate would be the IBM Cryptographic Coprocessor 4758 or its successor 4764 which is certified under FIPS PUB 140-2 [SW99,IBM].…”
Section: Tamper-proof Hardware Token Tmentioning
confidence: 99%
“…In many cases the available memory within T will not be sufficient to store D or intermediate values during evaluation of f . If needed, T might resort to additional (slow) secure external memory (e.g., [GKM09]). The token T could be instantiated with a cryptographic coprocessor built by a thirdparty manufacturer whom C trusts in a way that T does not leak any information to S. A possible candidate would be the IBM Cryptographic Coprocessor 4758 or its successor 4764 which is certified under FIPS PUB 140-2 [SW99,IBM].…”
Section: Tamper-proof Hardware Token Tmentioning
confidence: 99%
“…If needed, T might resort to additional (slow) secure external memory (e.g., [10]). In many cases the available memory within T will not be sufficient to store D or intermediate values during evaluation of f .…”
Section: Tamper-proof Hardware Token Tmentioning
confidence: 99%
“…In a recent work, Garay et al [9] also address the problem of MAC precomputations. However, they consider MACs in the context of hardware security and show how to perform most of a MAC computation offline, before the message is available.…”
Section: Encrypt-then-macmentioning
confidence: 99%