共 38 条
[1]
Anati I., 2013, P 2 INT WORK HARD AR
[2]
[Anonymous], 2010, HotSec
[3]
[Anonymous], 2016, Intel 64 and IA-32 Architectures Software Developer Manuals
[4]
[Anonymous], 2017, P 51 INT CAMB C SEC, P1, DOI [10.1109/CCST.2017.8167847, DOI 10.1109/CCST.2017.8167847]
[5]
Biryukov A., 2011, Encyclopedia of Cryptography and Security, P704, DOI [10.1007/978-1-4419-5906-5_588, DOI 10.1007/978-1-4419-5906-5_588]
[6]
Breuer Peter T., 2013, Engineering Secure Software and Systems. 5th International Symposium, ESSoS 2013. Proceedings, P123, DOI 10.1007/978-3-642-36563-8_9
[7]
Breuer P. T., 2017, P 14 INT C SEC CRYPT, V4, P247
[8]
A Practical Encrypted Microprocessor
[J].
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4,
2016,
:239-250
[9]
A Fully Encrypted Microprocessor The Secret Computer is Nearly Here
[J].
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS,
2016, 83
:1282-1287
[10]
Buer M., 2006, US Pat. App., Patent No. [11/159,669, 11159669]