{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:01:05Z","timestamp":1742378465519,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2000,11,12]]},"DOI":"10.1145\/378993.379237","type":"proceedings-article","created":{"date-parts":[[2004,2,3]],"date-time":"2004-02-03T15:24:38Z","timestamp":1075821878000},"page":"168-177","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":144,"title":["Architectural support for copy and tamper resistant software"],"prefix":"10.1145","author":[{"given":"David Lie Chandramohan","family":"Thekkath","sequence":"first","affiliation":[{"name":"Computer Systems Laboratory, Stanford University, Stanford, CA and Compaq Systems Research"}]},{"given":"Mark","family":"Mitchell","sequence":"additional","affiliation":[{"name":"Computer Systems Laboratory, Stanford University, Stanford, CA"}]},{"given":"Patrick","family":"Lincoln","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[]},{"given":"John","family":"Mitchell","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Horowitz","sequence":"additional","affiliation":[{"name":"Computer Systems Laboratory, Stanford University, Stanford, CA"}]}],"member":"320","published-online":{"date-parts":[[2000,11,12]]},"reference":[{"key":"e_1_3_2_1_1_2","unstructured":"Business Software Alliance 2000. http:\/\/www bsa. org.]] Business Software Alliance 2000. http:\/\/www bsa. org.]]"},{"key":"e_1_3_2_1_2_2","unstructured":"The Trusted Computing Platform Allicance 2000. http:\/\/www. trustedpc com.]] The Trusted Computing Platform Allicance 2000. http:\/\/www. trustedpc com.]]"},{"key":"e_1_3_2_1_3_2","volume-title":"Serpent: A proposal for the advanced encryption standard. Technical report","author":"Anderson R.","year":"2000","unstructured":"R. Anderson , E. Biham , and L. Knudsen . Serpent: A proposal for the advanced encryption standard. Technical report , National Institute of Standards and Technology (NIST) , March 2000 . Available at http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/r2algs, htm.]] R. Anderson, E. Biham, and L. Knudsen. Serpent: A proposal for the advanced encryption standard. Technical report, National Institute of Standards and Technology (NIST), March 2000. Available at http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/r2algs, htm.]]"},{"key":"e_1_3_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379238"},{"key":"e_1_3_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703964"},{"key":"e_1_3_2_1_7_2","volume-title":"AES proposal: Rijndael. Technical report","author":"Daemen J.","year":"2000","unstructured":"J. Daemen and V. Rijmen . AES proposal: Rijndael. Technical report , National Institute of Standards and Technology (NIST) , March 2000 . Available at http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/r2algs, htm.]] J. Daemen and V. Rijmen. AES proposal: Rijndael. Technical report, National Institute of Standards and Technology (NIST), March 2000. Available at http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/r2algs, htm.]]"},{"key":"e_1_3_2_1_8_2","first-page":"19.7.1","volume-title":"Proceedings of the IEEE Custom Integrated Circuits Conference","author":"Eberle H.","year":"1992","unstructured":"H. Eberle and C. Thacker . A 1Gbit\/second GaAs DES chip . In Proceedings of the IEEE Custom Integrated Circuits Conference , pages 19.7.1 - 19.7.4 , May 1992 .]] H. Eberle and C. Thacker. A 1Gbit\/second GaAs DES chip. In Proceedings of the IEEE Custom Integrated Circuits Conference, pages 19.7.1-19.7.4, May 1992.]]"},{"key":"e_1_3_2_1_9_2","unstructured":"Wave Corporation Embassy Technology 2000. http:\/\/www wave. com.]] Wave Corporation Embassy Technology 2000. http:\/\/www wave. com.]]"},{"key":"e_1_3_2_1_10_2","first-page":"79","volume-title":"Proceedings of the International Workshop on Intelligent Communications and Multimedia Tervninals","author":"Gilmont T.","year":"1998","unstructured":"T. Gilmont , J.-D. Legat , and J.-J. Quisquater . An architecture of security management unit for safe hosting of multiple agents . In Proceedings of the International Workshop on Intelligent Communications and Multimedia Tervninals , pages 79 - 82 , November 1998 .]] T. Gilmont, J.-D. Legat, and J.-J. Quisquater. An architecture of security management unit for safe hosting of multiple agents. In Proceedings of the International Workshop on Intelligent Communications and Multimedia Tervninals, pages 79-82, November 1998.]]"},{"key":"e_1_3_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1049\/el:19991424"},{"key":"e_1_3_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1974.6323581"},{"issue":"1","key":"e_1_3_2_1_13_2","first-page":"5","article-title":"Message authentication with MD5","volume":"1","author":"Kaliski B.","year":"1995","unstructured":"B. Kaliski Jr . and M. Robshaw . Message authentication with MD5 . CryptoBytes , 1 ( 1 ): 5 - 8 , 1995 .]] B. Kaliski Jr. and M. Robshaw. Message authentication with MD5. CryptoBytes, 1(1):5-8, 1995.]]","journal-title":"CryptoBytes"},{"key":"e_1_3_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_15_2","doi-asserted-by":"crossref","unstructured":"H. Krawczyk M. Bellare and R. Canetti. HMAC: Keyed-hashing for message authentication. http:\/\/www ietf. org\/rfc\/rfc2104.txt February 1997.]] H. Krawczyk M. Bellare and R. Canetti. HMAC: Keyed-hashing for message authentication. http:\/\/www ietf. org\/rfc\/rfc2104.txt February 1997.]]","DOI":"10.17487\/rfc2104"},{"key":"e_1_3_2_1_16_2","volume-title":"Calmers Microprocessor","author":"Krewell K.","year":"2000","unstructured":"K. Krewell . Quicktake : Willamette revealed. Technical report , Calmers Microprocessor , February 2000 . Available at www. MPRonline. com.]] K. Krewell. Quicktake: Willamette revealed. Technical report, Calmers Microprocessor, February 2000. Available at www. MPRonline. com.]]"},{"key":"e_1_3_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138874"},{"key":"e_1_3_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/195473.195524"},{"key":"e_1_3_2_1_19_2","volume-title":"Handbook of Applied Cryptography","author":"Menzies A.J.","year":"1997","unstructured":"A.J. Menzies , P.C. van Oorschot , and S.A. Vanstone . Handbook of Applied Cryptography . CRC Press , 1997 .]] A.J. Menzies, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.]]"},{"key":"e_1_3_2_1_20_2","volume-title":"NBS FIPS PUB 467 \"Data Encryption Standard","author":"National Bureau of Standards.","year":"1977","unstructured":"National Bureau of Standards. NBS FIPS PUB 467 \"Data Encryption Standard \". National Bureau of Standards, U.S. Department of Commerce , January 1977 .]] National Bureau of Standards. NBS FIPS PUB 467 \"Data Encryption Standard\". National Bureau of Standards, U.S. Department of Commerce, January 1977.]]"},{"key":"e_1_3_2_1_21_2","doi-asserted-by":"publisher","DOI":"10.5555\/783327.783592"},{"key":"e_1_3_2_1_22_2","volume-title":"American national standard for financial institution key management (wholesale)","author":"ANSI","year":"1985","unstructured":"ANSI X9.17 (Revised). American national standard for financial institution key management (wholesale) . American Bankers Association , 1985 .]] ANSI X9.17 (Revised). American national standard for financial institution key management (wholesale). American Bankers Association, 1985.]]"},{"key":"e_1_3_2_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_24_2","volume-title":"Applied Cryptography","author":"Schneier B.","year":"1996","unstructured":"B. Schneier . Applied Cryptography . John Wiley & amp; Sons, 2 nd edition, 1996 .]] B. Schneier. Applied Cryptography. John Wiley & Sons, 2nd edition, 1996.]]","edition":"2"},{"key":"e_1_3_2_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.1979.6368160"},{"key":"e_1_3_2_1_27_2","volume-title":"Hardware performance simulations of round 2 advanced encryption standard algorithms. Technical report","author":"Weeks B.","year":"2000","unstructured":"B. Weeks , M. Bean , T. Rozylowicz , and C. Ficke . Hardware performance simulations of round 2 advanced encryption standard algorithms. Technical report , National Security Agency , August 2000 . Available at http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/r2anlsys, htm.]] B. Weeks, M. Bean, T. Rozylowicz, and C. Ficke. Hardware performance simulations of round 2 advanced encryption standard algorithms. Technical report, National Security Agency, August 2000. Available at http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/r2anlsys, htm.]]"}],"event":{"name":"ASPLOS00: ASPLOS 2000 Conference","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Cambridge Massachusetts USA","acronym":"ASPLOS00"},"container-title":["Proceedings of the ninth international conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/378993.379237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T11:18:25Z","timestamp":1693826305000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/378993.379237"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,11,12]]},"references-count":25,"alternative-id":["10.1145\/378993.379237","10.1145\/378993"],"URL":"https:\/\/doi.org\/10.1145\/378993.379237","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/384264.379237","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/378995.379237","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2000,11,12]]},"assertion":[{"value":"2000-11-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}