UMAC: Fast and Secure Message Authentication
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Energy Scalable Universal Hashing
IEEE Transactions on Computers
Improving Cost, Performance, and Security of Memory Encryption and Authentication
Proceedings of the 33rd annual international symposium on Computer Architecture
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
A fast real-time memory authentication protocol
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Software performance of universal hash functions
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
In this paper, we proposed an improved memory integrity protection scheme to provide real-time protection service. In addition, we for the first time propose a provably secure scheme that takes advantage of the "error inheritance" property, which can minimize the costly check process that is normally required before every access. The security of the proposed scheme is rigorously analyzed and the performance is measured. The peak performance of the new scheme can be improved by up to a factor of 5 over a previously proposed scheme based on Merkle Trees.