Memory encryption with an authentication tree has received significant attentions due to the increasing threats of active attacks and the widespread use of non-volatile memories. It is also gradually deployed to real-world systems, as shown by SGX available in Intel processors. The topic of memory encryption has been recently extensively studied, most actively from the viewpoint of system architecture. In this paper, we study the topic from the viewpoint of provable secure symmetric-key designs, with a primal focus on latency which is an important criterion for memory. A progress in such a direction can be observed in the memory encryption scheme inside SGX (SGX integrity tree or SIT). It uses dedicated, low-latency symmetric-key components...
Memory encryption is used in many devices to protect memory content from attackers with physical acc...
Persistent key-value stores (KVSs) are fundamental building blocks of modern software products. A KV...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
This study presents an efficient persistent memory encryption mechanism, named Crystalor, which effi...
Recently there is a growing interest in both the architecture and the security community to create a...
Abstract We define a new authentication tree in the symmetric key setting, which has the same comput...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based...
The wide adoption of cloud computing has established integrity and confidentiality of data in memory...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the...
Memory encryption is used in many devices to protect memory content from attackers with physical acc...
Persistent key-value stores (KVSs) are fundamental building blocks of modern software products. A KV...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
This study presents an efficient persistent memory encryption mechanism, named Crystalor, which effi...
Recently there is a growing interest in both the architecture and the security community to create a...
Abstract We define a new authentication tree in the symmetric key setting, which has the same comput...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based...
The wide adoption of cloud computing has established integrity and confidentiality of data in memory...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the...
Memory encryption is used in many devices to protect memory content from attackers with physical acc...
Persistent key-value stores (KVSs) are fundamental building blocks of modern software products. A KV...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...