Non-deterministic Processors

David May, Henk Muller, Nigel Smart

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)


New techniques have been discovered to find the secret keys stored in smart-cards. These techniques have caused concern for they can allow people to recharge their smartcards (in effect printing money), or illegally use phone or digital TV services. We propose a new processor design which will counteract these techniques. By randomising the instruction stream being executed by the processor we can hide the secret key stored in a smartcard. The extension we propose can be added to existing processors, and is transparent to the algorithm.
Translated title of the contributionNon-deterministic Processors
Original languageEnglish
Title of host publicationInformation, Security and Privacy - ACISP 2001
PublisherSpringer Berlin Heidelberg
Pages115 - 129
Number of pages15
Publication statusPublished - Jul 2001

Bibliographical note

Editors: Varadharajan, V and Mu, Y
ISBN: 3540423001
Publisher: Springer Verlag
Name and Venue of Conference: Information Security and Privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001


Dive into the research topics of 'Non-deterministic Processors'. Together they form a unique fingerprint.

Cite this