<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.7//EN" "https://dtd.nlm.nih.gov/ncbi/pubmed/in/PubMed.dtd">
<ArticleSet>
<Article>
<Journal>
				<PublisherName>University of Tehran</PublisherName>
				<JournalTitle>Journal of Algorithms and Computation</JournalTitle>
				<Issn>2476-2776</Issn>
				<Volume>50</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2018</Year>
					<Month>06</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Tree Technology for Memory Confidentiality Integrity Protection</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>51</FirstPage>
			<LastPage>67</LastPage>
			<ELocationID EIdType="pii">68338</ELocationID>
			
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Hui Min</FirstName>
					<LastName>Meng</LastName>
<Affiliation>School of Information Science and Engineering, Dalian Polytechnic University, Dalian, China ,116034.</Affiliation>

</Author>
<Author>
					<FirstName>HongJin</FirstName>
					<LastName>Wang</LastName>
<Affiliation>School of Information Science and Engineering, Dalian Polytechnic University, Dalian, China ,116034.</Affiliation>

</Author>
<Author>
					<FirstName>NianMin</FirstName>
					<LastName>Yao</LastName>
<Affiliation>Fauclty of Electronic Information Science and Engineering, Dalian University of Technology, Dalian, China, 116024</Affiliation>

</Author>
<Author>
					<FirstName>ShunYi</FirstName>
					<LastName>Cheng</LastName>
<Affiliation>Fauclty of Electronic Information Science and Engineering, Dalian University of Technology, Dalian, China, 116024</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2018</Year>
					<Month>02</Month>
					<Day>08</Day>
				</PubDate>
			</History>
		<Abstract>PCIPunderline{ }Tree is a Parallelized memory Confidentiality and Integrity Protection technology (PCIP) method that pre-diffuses and encrypts the data stored in off-chip counter value for confidentiality and integrity protection of data, adding redundant checking data to the protection data block to ensure the integrity and confidentiality of the memory data. Then use the Simple Scalar tool to run 10 processors (SPEC2000) benchmark programs to simulation test. The result shows that the PCIPunderline{ }Tree method is greatly improved the running efficiency and the efficiency of encryption methods to compare with the Parallelized Encryption and Integrity Checking Engine (PE-ICE) method, at the same time, through the redundant data to check data integrity is better than using complex Hash algorithm to calculate the checking value and reduce system delay, reduce storage overhead chip, and ensure the real-time encryption and checking.</Abstract>
<ArchiveCopySource DocType="pdf">https://jac.ut.ac.ir/article_68338_0a7e4f4334e2402b0b30c24b72ac86b6.pdf</ArchiveCopySource>
</Article>
</ArticleSet>
