Parallelizable authentication trees
WE Hall, CS Jutla - Selected Areas in Cryptography: 12th International …, 2006 - Springer
… We define a new authentication tree in the … authentication tree, but which unlike the latter,
allows for all the cryptographic operations required for an update to be performed in parallel. …
allows for all the cryptographic operations required for an update to be performed in parallel. …
A parallel decision tree-based method for user authentication based on keystroke patterns
Y Sheng, VV Phoha… - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
… is still a part of the authentication. We propose a parallel decision tree (DT)-based method …
user list and to type a common short string for authentication. Each user needs to provide nine …
user list and to type a common short string for authentication. Each user needs to provide nine …
Tec-tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks
… This way when the pipeline executes speculatively over data for which the tree authentication
process has not terminated, we reduce the risk of such a speculative execution to the …
process has not terminated, we reduce the risk of such a speculative execution to the …
Hardware mechanisms for memory authentication: A survey of existing techniques and engines
R Elbaz, D Champagne, C Gebotys, RB Lee… - … Science IV: Special …, 2009 - Springer
… authentication, namely integrity trees; in particular, we show why all existing memory
authentication … PAT and TEC-Tree are both parallelizable for the tree authentication and update …
authentication … PAT and TEC-Tree are both parallelizable for the tree authentication and update …
Continuous authentication on relational streams
… -Tree), which allows authentication of spatial queries by combining concepts of the R-Tree
and the MH-Tree. … CombineVO scans the two VOs in parallel, retrieving an entry En (Ec) from …
and the MH-Tree. … CombineVO scans the two VOs in parallel, retrieving an entry En (Ec) from …
Framework for fast memory authentication using dynamically skewed integrity tree
… authentication framework that combines architecture-specific optimizations of the integrity
tree … Guillemin, “Tec-tree: A low-cost, parallelizable tree for efficient defense against memory …
tree … Guillemin, “Tec-tree: A low-cost, parallelizable tree for efficient defense against memory …
Streaming authenticated data structures
… parallelized because they are traditionally implemented with Merkle trees [28]: Whenever a
leaf value of the checker tree is … tree can be used to overcome this barrier, yielding a parallel …
leaf value of the checker tree is … tree can be used to overcome this barrier, yielding a parallel …
MEAS: Memory encryption and authentication secure against side-channel attacks
… and authentication trees by storing encryption keys in a tree … Authentication trees over m
memory blocks with arity a have … of authentication trees are Merkle trees [40], Parallelizable …
memory blocks with arity a have … of authentication trees are Merkle trees [40], Parallelizable …
Improving cost, performance, and security of memory encryption and authentication
C Yan, D Englender, M Prvulovic, B Rogers… - ACM SIGARCH …, 2006 - dl.acm.org
… tree on authentication latency, we compute authentication codes of all needed levels of the
authentication tree in parallel… Upon a data cache miss, we attempt to locate its authentication …
authentication tree in parallel… Upon a data cache miss, we attempt to locate its authentication …
Memory checking for parallel RAMs
S Mathialagan - Theory of Cryptography Conference, 2023 - Springer
… of the leaf nodes of the authentication tree, each CPU also locally … are propagated through
the authentication tree, we can then … In order to update the tree in parallel, we instead carefully …
the authentication tree, we can then … In order to update the tree in parallel, we instead carefully …