Secure Cryptographic Coprocessor - Publications
Criteria: the paper has to pertain to secure coprocessing, and at least one author has to have had an affiliation with the Watson team (although not necessarily when the paper was published). Listed in chronological order. Corrections and additions are welcome!
- Dyer,
J.G., Lindemann, M., Perez, R., Sailer, R.,
Smith, S.W., van Doorn, L., Weingart, S..
The IBM Secure Coprocessor: Overview and Retrospective.
IEEE Computer, October 2001,pp. 57-66. (Paper - Draft version PDF)
(Retrospective)
- N. Itoi.
Secure Coprocessor Integration with Kerberos V5.
IBM Research Report RC-21797. IBM T.J.Watson Research Center, July 2000.
(How to use a secure coprocessor to make Kerberos more secure.)
- S.
W. Smith, D. Safford.
Practical Private Information Retrieval with Secure Coprocessors.
IBM Research Report RC-21806. IBM T.J. Watson Research Center, July 2000.
(Privacy protection issues and uses)
- M. Lindemann, S. W. Smith.
Improving DES Hardware Throughput for Short Operations.
IBM Research Report RC-21798. IBM T.J. Watson Research Center, July 2000.
(Optimizing DES)
- J. Dyer, R. Perez, S.W. Smith, M. Lindemann.
Application Support Architecture for a High-Performance, Programmable Secure Coprocessor.
22nd National Information Systems Security Conference. October 1999.
(What we put in the middle software layer, and why)
- S.W. Smith, S.H. Weingart.
Building a High-Performance, Programmable Secure Coprocessor.
Computer Networks (Special Issue on Computer Network Security). 31: 831-860. April 1999.
(The security architecture that solves these problems)
- S.W. Smith, R. Perez, S.H.
Weingart, V. Austel.
Validating a High-Performance, Programmable Secure Coprocessor.
22nd National Information Systems Security Conference. October 1999.
(Tales of the world's first FIPS 140-1 Level 4 validation.)
- S.W. Smith, E. Palmer, S.H.
Weingart.
Using a High-Performance, Programmable Secure Coprocessor.
2nd International Conference on Financial Cryptography. February 1998. (Springer-Verlag LNCS)
(Design problems introduced by the goal of building one as a mass-produced product.)
- S.W. Smith, V. Austel.
Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors.
3rd USENIX Workshop on Electronic Commerce. August 1998.
(Our PRELIMINARY formal modelling strategy.)
- S.W.
Smith.
Secure Coprocessing Applications and Research Issues.
Los Alamos Unclassified Release LA-UR-96-2805. Los Alamos National Laboratory, 1996.
(What a high-performance secure coprocessor might enable.)
- H. Gobioff, S.W. Smith, J.D. Tygar,
B.S. Yee.
Smart Cards in Hostile Environments.
2nd USENIX Workshop on Electronic Commerce.1996.
- B.S.
Yee and J.D. Tygar.
Secure Coprocessors in Electronic Commerce Applications.
1st USENIX Workshop on Electronic Commerce.July 1995.
- S.W.
Smith.
Secure Distributed Time for Secure Distributed Protocols.
(Ph.D. Thesis.) Computer Science Technical Report CMU-CS-94-177. Carnegie Mellon University. September 1994.
- B.S.
Yee.
Using Secure Coprocessors.
(Ph.D. Thesis.) Computer Science Technical Report CMU-CS-94-149. Carnegie Mellon University. May 1994.
- J.D.
Tygar, B.S. Yee.
Cryptography: It's Not Just for Electronic Mail Anymore.
Computer Science Technical Report CMU-CS-93-107. Carnegie Mellon University, 1993. - J.D.
Tygar and B.S. Yee.
Dyad: A System for Using Physically Secure Coprocessors.
Harvard-MIT Workshop on Protection of Intellectual Property.April 1993.
- E.R.
Palmer.
An Introduction to Citadel---A Secure Crypto Coprocessor for Workstations.
Research Report RC 18373, IBM T.J. Watson Research Center, 1992.
- S.R.
White, S.H. Weingart, W.C Arnold, E.R. Palmer.
Introduction to the Citadel Architecture: Security in Physically Exposed Environments.
Research Report RC 16672, IBM T.J. Watson Research Center, 1991.
- S.H.
Weingart, S.R. White, W.C. Arnold, G.P.
Double.
An Evaluation System for the Physical Security of Computing Systems.
6th Computer Security Applications Conference. 1990.
- S.R.
White and L. Comerford.
ABYSS: A Trusted Architecture for Software Protection.
IEEE Security and Privacy. Oakland, 1987.
- S.H.
Weingart.
Physical Security for the microABYSS System.
IEEE Security and Privacy. Oakland, 1987.