Author:
Ince Semih,Espes David,Lallet Julien,Gogniat Guy,Santoro Renaud
Publisher
Springer International Publishing
Reference51 articles.
1. Abdellatif, K. M., Chotin-Avot, R., & Mehrez, H. (2013). Protecting FPGA bitstreams using authenticated encryption. In 2013 IEEE 11th International New Circuits and Systems Conference (NEWCAS) (pp. 1–4). https://doi.org/10.1109/NEWCAS.2013.6573635
2. Alibaba FPGA cloud documentation. https://www.alibabacloud.com/help/en/fpga-based-ecs-instance
3. ARM TrustZone Documentation. https://developer.arm.com/documentation/102418/0101/What-is-TrustZone-
4. Bellare, M., & Namprempre, C. (2008). Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology, 21, 469–491. https://doi.org/10.1007/s00145-008-9026-x
5. Cantor, S., Kemp, J., Philpott, R., & Maler, E. (2005). Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard saml-core-2.0-os.