Skip to content

Non-deterministic Processors

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publicationInformation, Security and Privacy - ACISP 2001
Publisher or commissioning bodySpringer Berlin Heidelberg
Pages115 - 129
Number of pages15
DatePublished - Jul 2001


New techniques have been discovered to find the secret keys stored in smart-cards. These techniques have caused concern for they can allow people to recharge their smartcards (in effect printing money), or illegally use phone or digital TV services. We propose a new processor design which will counteract these techniques. By randomising the instruction stream being executed by the processor we can hide the secret key stored in a smartcard. The extension we propose can be added to existing processors, and is transparent to the algorithm.

Additional information

Editors: Varadharajan, V and Mu, Y ISBN: 3540423001 Publisher: Springer Verlag Name and Venue of Conference: Information Security and Privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001

View research connections

Related faculties, schools or groups