Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter
Focusing on the problem of high overhead and frequent overflow of the counter mode encryption, this paper proposed an efficient scheme to protect data confidentiality and integrity. Based on the local characteristic of data accessing, the scheme set different counter length for memory area according...
Main Authors: | Ma Haifeng, Yao Nianmin, Cai Shaobin, Han Qilong |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2014-12-01
|
Series: | Journal of Algorithms & Computational Technology |
Online Access: | https://doi.org/10.1260/1748-3018.8.4.421 |
Similar Items
-
A Method for Memory Integrity Authentication Based on Bloom Filter
by: Yao Nianmin, et al.
Published: (2014-09-01) -
Architectural Support for Protecting Memory Integrity and Confidentiality
by: Shi, Weidong
Published: (2006) -
Insider threat : memory confidentiality and integrity in the cloud
by: Rocha, Francisco
Published: (2015) -
Architecture Support for Memory Confidentiality and Integrity in Embedded Systems
by: Yuanyuan Zhang, et al.
Published: (2009-01-01) -
The Protection and Disclosure of Confidential Information
by: Pearce, P. A.
Published: (1979)