Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:papers:space2015 [2015-10-22 21:09]
petrs
public:papers:space2015 [2016-12-01 14:28] (current)
Line 22: Line 22:
    }    }
      
----- +   
-----+
  
  
Line 34: Line 34:
   * yet withstand a skilled attacker with direct physical access to target device.   * yet withstand a skilled attacker with direct physical access to target device.
 The typical usage scenario is high speed security box in datacenter shared by many users without need for trust put in security box operator.  The architecture utilizes grid of cryptographic smart cards interconnected by secure channels.   The typical usage scenario is high speed security box in datacenter shared by many users without need for trust put in security box operator.  The architecture utilizes grid of cryptographic smart cards interconnected by secure channels.  
 +
 +{{:public:papers:cryptohive.png?400|}}