{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:42:27Z","timestamp":1725471747275},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478201"},{"type":"electronic","value":"9783540478232"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11909033_11","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T14:51:56Z","timestamp":1160578316000},"page":"120-129","source":"Crossref","is-referenced-by-count":1,"title":["A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors"],"prefix":"10.1007","author":[{"given":"J\u00f6rg","family":"Platte","sequence":"first","affiliation":[]},{"given":"Ra\u00fal Dur\u00e1n","family":"D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Edwin","family":"Naroska","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Suh, G.E.: AEGIS: A Single-Chip Secure Processor. PhD thesis, Massachusetts Institute of Technology (2005)","DOI":"10.1016\/j.istr.2005.05.002"},{"key":"11_CR2","first-page":"280","volume-title":"CF 2005: Proceedings of the 2nd conference on Computing frontiers","author":"J. Platte","year":"2005","unstructured":"Platte, J., Naroska, E.: A combined hardware and software architecture for secure computing. In: CF 2005: Proceedings of the 2nd conference on Computing frontiers, pp. 280\u2013288. ACM Press, New York (2005)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/11682127_31","volume-title":"Architecture of Computing Systems - ARCS 2006","author":"J. Platte","year":"2006","unstructured":"Platte, J., Naroska, E., Grundmann, K.: A cache design for a security architecture for microprocessors (SAM). In: Grass, W., Sick, B., Waldschmidt, K. (eds.) ARCS 2006. LNCS, vol.\u00a03894, pp. 435\u2013449. Springer, Heidelberg (2006)"},{"key":"11_CR4","unstructured":"Sun Microsystems: Java card security white paper (2001), http:\/\/java.sun.com\/products\/javacard\/JavaCardSecurityWhitePaper.pdf"},{"key":"11_CR5","unstructured":"Yee, B.: Using secure coprocessors. PhD thesis, Carnegie Mellon University (1994)"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1147\/rd.483.0475","volume":"48","author":"T.W. Arnold","year":"2004","unstructured":"Arnold, T.W., Van Doorn, L.P.: The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer. IBM Journal of Research and Development\u00a048, 475\u2013487 (2004)","journal-title":"IBM Journal of Research and Development"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C.A., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J.C., Horowitz, M.: Architectural support for copy and tamper resistant software (2000)","DOI":"10.21236\/ADA419599"},{"key":"11_CR8","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL (1997)"},{"key":"11_CR9","unstructured":"Cohen, B., Laurie, B.: AES-hash (2001), http:\/\/csrc.nist.gov\/CryptoToolkit\/modes\/proposedmodes\/aes-hash\/aeshash.pdf"},{"key":"11_CR10","first-page":"122","volume-title":"IEEE Symposium on Security and Privacy, 1109 Spring Street, Suite 300, Silver Spring, MD 20910","author":"R.C. Merkle","year":"1980","unstructured":"Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, pp. 122\u2013134. IEEE Computer Society Press, USA (1980)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation. Methods and Techniques. NIST (2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"11_CR12","unstructured":"Preneel, B.: Analysis and Design of Cryptographic Hash Functions. PhD thesis, Katholieke Universiteit Leuven (Belgium) (1993)"},{"key":"11_CR13","unstructured":"Bellard, F.: QEMU (2005), http:\/\/fabrice.bellard.free.fr\/qemu"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11909033_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T16:36:01Z","timestamp":1555864561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11909033_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478201","9783540478232"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11909033_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}