Alternative Methods to Achieve arbitrary n-bit
permutations in O(log(n)) instructions:
1. R. B. Lee, Z. Shi,
and X. Yang, “Efficient Permutation Instructions for Fast Software
Cryptography,” IEEE Micro, vol. 21,
no. 6, pp. 56-69, December 2001.
2. Zhijie Shi and Ruby B.
Lee, “Bit Permutation Instructions for Accelerating Software Cryptography”, Proceedings of the IEEE International
Conference on Application-Specific Systems, Architectures and Processors,
pp. 138-148, July 2000.
3. Xiao Yang, Manish Vachharajani, and Ruby B. Lee, “Fast Subword
Permutation Instructions Based on Butterfly Networks”, Proceedings of SPIE Media Processors 2000, pp. 80-86, January 2000.
4. Xiao Yang and Ruby
B. Lee, “Fast Subword Permutation Instructions Using
Omega and Flip Network Stages”, Proceedings
of the International Conference on Computer Design, pp. 15-22, September
2000.
5. John P. McGregor and
Ruby B. Lee, “Architectural Techniques for Accelerating Subword
Permutations with Repetitions”, IEEE Transactions on Very Large Scale
Integration Systems, vol. 11, no. 3, pp. 325-335, June 2003.
6. Zhijie Jerry Shi and Ruby
B. Lee, “Implementation Complexity of Bit Permutation Instructions”,
Proceedings of the Asilomar Conference on Signals,
Systems, and Computers, November 2003.
Cryptographic
Properties and Sorting Efficiency of Permutation Instructions:
7. R. B. Lee, R. L. Rivest, M.J.B. Robshaw, Z.J. Shi,
and Y.L. Yin, “On Permutation Operations in Cipher Design”, Proceedings of the
International Conference on Information Technology (ITCC), April 2004.
8. Zhijie Shi and Ruby B.
Lee, “Subword Sorting with Versatile Permutation
Instructions”, Proceedings of the International Conference on Computer Design
(ICCD 2002), pp. 234-241, September 2002.
Achieving arbitrary
permutations in O(1) cycles:
9. Ruby B. Lee, Zhijie Shi and Xiao Yang, “How a Processor can Permute n
bits in O(1) cycles.” Hot Chips conference, August
2002.
10. Zhijie Shi, Xiao Yang and
Ruby B. Lee, “Arbitrary Bit Permutations in One or Two Cycles”, Proceedings of
the IEEE International Conference on Application-Specific Systems,
Architectures and Processors (ASAP 2003), pp. 237-247, June 2003.
11. Ruby B. Lee, Xiao
Yang and Zhijie Shi, “Validating word-oriented
processors for bit and multi-word operations”, Proceedings of the Asia-Pacific
Computer Systems Architecture Conference (ACSAC), September 2004.
Thesis
12. Zhijie Jerry Shi, “Bit
Permutation Instructions: Architecture, Implementation and Cryptographic
Properties,” Princeton
University Ph.D. dissertation, March 2004.
B. Attack Resistant Architecture
DDoS and SRAS:
13. John P. McGregor,
David K. Karig, Zhijie Shi
and Ruby B. Lee, "A Processor Architecture Defense against Buffer Overflow
Attacks", Proceedings of IEEE International Conference on Information
Technology: Research and Education (ITRE 2003), pp. 243-250, August 2003.
14. Ruby B. Lee, David
K. Karig, John P. McGregor, and Zhijie
Shi, "Enlisting Hardware Architecture to Thwart Malicious Code
Injection," Proceedings of the International Conference on Security in
Pervasive Computing (SPC-2003), Lecture Notes in Computer Science, Springer Verlag, March 2003.
15. Stephen Specht and
Ruby B. Lee, “Taxonomies of DDoS Attacks, Tools and Countermeasures”,
Proceedings of PDCS 2004, October 2004.
16. David Karig and Ruby B. Lee, Remote Denial of Service Attacks and
Countermeasures, Princeton University
Department of Electrical Engineering Technical Report CE-L2001-002, October
2001.
Other
Attack-Resistant:
17. A. Murat Fiskiran and Ruby B. Lee,
“Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code
Execution”, to be published in the
International Conference on Computer Design (ICCD), October 2004.
18. John P. McGregor, Yiqun L. Yin, and Ruby B. Lee, "Efficient Traitor
Tracing Using RSA," Princeton
University Department of Electrical Engineering Technical Report CE-L2003-004,
May 2003.
19. John P. McGregor and Ruby B. Lee, “Virtual Secure
Co-Processing on General-purpose Processors,” Princeton University Department of Electrical Engineering Technical
Report CE-L2002-003, November 2002.
20. John P. McGregor and Ruby B. Lee, “Protecting
Cryptographic Keys and Computations via Virtual Secure Coprocessing”, 11th International Conference on
Architectural Support for Programming Languages and Operating Systems (ASPLOS),
Workshop on Architectural Support for Security and Anti-virus (WASSA), October
9-13, 2004.
Secure Embedded
Systems:
21. Paul Kocher, Ruby B. Lee, Gary McGraw, Anand
Ranganathan and Srivaths Ravi, “Security as a new dimension in Embedded System
Design”, Proceedings of Design Automation Conference, June 2004.
22. Ruby Lee, “Processor
Architectures for Efficient Secure Information Processing”, 41st. Design
Automation Conference invited talks, June 2004 (http://videos.dac.com/41st/46_3/46-3.html)
PAX and ECC:
23. A. Murat Fiskiran and Ruby B. Lee,
“PAX: A Datapath-Scalable Minimalist Cryptographic
Processor for Mobile Environments”, Book chapter in Embedded Cryptographic Hardware: Design and Security, Nova Science
Publishers, NY,
24. Princeton
Architecture Laboratory for Multimedia and Security (PALMS), PAX Project,
<http://palms.ee.princeton.edu/PAX>.
25. A. Murat Fiskiran and Ruby B. Lee,
“Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite
Fields”, to be published in Proceedings
of the International Conference on Application-Specific Systems, Architectures,
and Processors (ASAP),
Sept 2004.
26. A. Murat Fiskiran and Ruby B. Lee, “
Performance Scaling of Cryptography Operations in Servers and Mobile Clients’,
to be published in ASPLOS/Beacon Workshop, Oct 2004.
27. A. Murat Fiskiran and Ruby B. Lee,
“Workload Characterization of Elliptic Curve Cryptography and other Network
Security Algorithms for Constrained Environments”, Proceedings of the IEEE International Workshop on Workload
Characterization, pp. 127-137, Nov 2002.
Older version:
Secure
Information Processing: