Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:papers:space2015 [2015-10-22 19:09] petrspublic:papers:space2015 [2016-12-01 13:28] (current) – external edit 127.0.0.1
Line 5: Line 5:
  
   * Conference page: [[http://cse.iitkgp.ac.in/conf/SPACE2015/|SPACE 2015]]   * Conference page: [[http://cse.iitkgp.ac.in/conf/SPACE2015/|SPACE 2015]]
-  * Download author pre-print of the paper: {{:public:papers:cryptohive_svenda_space2015.pdf|pdf}}+  * Download author pre-print of the paper: {{:public:papers:cryptohive_svenda_space2015.pdf.pdf|pdf}}
   * Download presentation: {{:public:papers:cryptohive_space2015_slides.pdf|pdf}}   * Download presentation: {{:public:papers:cryptohive_space2015_slides.pdf|pdf}}
   * Download used source codes: [[https://github.com/crocs-muni/JCAlgTest|JCAlgTest on GitHub]]   * Download used source codes: [[https://github.com/crocs-muni/JCAlgTest|JCAlgTest on GitHub]]
Line 22: Line 22:
    }    }
      
----- +   
-----+
  
  
Line 34: Line 34:
   * yet withstand a skilled attacker with direct physical access to target device.   * yet withstand a skilled attacker with direct physical access to target device.
 The typical usage scenario is high speed security box in datacenter shared by many users without need for trust put in security box operator.  The architecture utilizes grid of cryptographic smart cards interconnected by secure channels.   The typical usage scenario is high speed security box in datacenter shared by many users without need for trust put in security box operator.  The architecture utilizes grid of cryptographic smart cards interconnected by secure channels.  
 +
 +{{:public:papers:cryptohive.png?400|}}