Protecting cryptographic keys and computations via virtual secure coprocessing

@article{McGregor2005ProtectingCK,
  title={Protecting cryptographic keys and computations via virtual secure coprocessing},
  author={John Patrick McGregor and Ruby B. Lee},
  journal={SIGARCH Computer Architecture News},
  year={2005},
  volume={33},
  pages={16-26}
}
Cryptographic processing is a critical component of secure networked computing systems. The protection offered by cryptographic processing, however, greatly depends on the methods employed to manage, store, and exercise a user's cryptographic keys. In general, software-only key management schemes contain numerous security weaknesses. Thus, many systems protect keys with distributed protocols or supplementary hardware devices, such as smart cards and cryptographic coprocessors. However, these… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 18 CITATIONS

Injecting trust to cryptographic Key Management

  • 2009 11th International Conference on Advanced Communication Technology
  • 2009
VIEW 1 EXCERPT
CITES BACKGROUND

Trustworthy Computing under Resource Constraints with the DOWN Policy

  • IEEE Transactions on Dependable and Secure Computing
  • 2008
VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS

References

Publications referenced by this paper.

Advanced Encryption Standard (AES) - An Update

  • IMA Int. Conf.
  • 1999
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL