Parallelizable authentication trees

WE Hall, CS Jutla - Selected Areas in Cryptography: 12th International …, 2006 - Springer
… We define a new authentication tree in the … authentication tree, but which unlike the latter,
allows for all the cryptographic operations required for an update to be performed in parallel. …

A parallel decision tree-based method for user authentication based on keystroke patterns

Y Sheng, VV Phoha… - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
… is still a part of the authentication. We propose a parallel decision tree (DT)-based method …
user list and to type a common short string for authentication. Each user needs to provide nine …

Tec-tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks

R Elbaz, D Champagne, RB Lee, L Torres… - … and Embedded Systems …, 2007 - Springer
… This way when the pipeline executes speculatively over data for which the tree authentication
process has not terminated, we reduce the risk of such a speculative execution to the …

Hardware mechanisms for memory authentication: A survey of existing techniques and engines

R Elbaz, D Champagne, C Gebotys, RB Lee… - … Science IV: Special …, 2009 - Springer
authentication, namely integrity trees; in particular, we show why all existing memory
authentication … PAT and TEC-Tree are both parallelizable for the tree authentication and update …

Continuous authentication on relational streams

S Papadopoulos, Y Yang, D Papadias - The VLDB Journal, 2010 - Springer
… -Tree), which allows authentication of spatial queries by combining concepts of the R-Tree
and the MH-Tree. … CombineVO scans the two VOs in parallel, retrieving an entry En (Ec) from …

Framework for fast memory authentication using dynamically skewed integrity tree

S Vig, R Juneja, G Jiang, SK Lam… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
authentication framework that combines architecture-specific optimizations of the integrity
tree … Guillemin, “Tec-tree: A low-cost, parallelizable tree for efficient defense against memory …

Streaming authenticated data structures

C Papamanthou, E Shi, R Tamassia, K Yi - Advances in Cryptology …, 2013 - Springer
parallelized because they are traditionally implemented with Merkle trees [28]: Whenever a
leaf value of the checker tree is … tree can be used to overcome this barrier, yielding a parallel

MEAS: Memory encryption and authentication secure against side-channel attacks

T Unterluggauer, M Werner, S Mangard - Journal of cryptographic …, 2019 - Springer
… and authentication trees by storing encryption keys in a treeAuthentication trees over m
memory blocks with arity a have … of authentication trees are Merkle trees [40], Parallelizable

Improving cost, performance, and security of memory encryption and authentication

C Yan, D Englender, M Prvulovic, B Rogers… - ACM SIGARCH …, 2006 - dl.acm.org
tree on authentication latency, we compute authentication codes of all needed levels of the
authentication tree in parallel… Upon a data cache miss, we attempt to locate its authentication

Memory checking for parallel RAMs

S Mathialagan - Theory of Cryptography Conference, 2023 - Springer
… of the leaf nodes of the authentication tree, each CPU also locally … are propagated through
the authentication tree, we can then … In order to update the tree in parallel, we instead carefully …