Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.This paper explores a new approach to encrypted microprocessing, potentiating new trade-offs in security versus performance engineering. The coprocessor prototype described runs standard machine code (32-bit OpenRISC v1.1) with encrypted data in registers, on buses, and in memory. The architecture is 'superscalar', executing multiple instructions simultaneously, and is sophisticated enough that it achieves speeds approaching that of contemporary off-the-shelf processor cores. The aim of the design is to protect user data against the operator or owner of the processor, and so- called 'Iago' attacks in general, for those paradigms that require trust...
Un nombre important et en constante augmentation de systèmes numériques nous entoure. Tablettes, sma...
Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved. This...
Current crypto implementations rely on software running under general-purpose operating systems alon...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
AbstractA high-speed pre-production superscalar microprocessor that ‘works encrypted’ is described h...
Following a sequence of hardware designs for a fully homomorphic crypto-processor - a general purpos...
© 2017 IEEE. Over the past few years we have articulated theory that describes 'encrypted computing'...
‘Encrypted computing’ is an approach to preventing insider attacks by the privileged operator agains...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
We ask whether two or more images of arithmetic may inhabit the same space via different encodings. ...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
Secret keys can be extracted from the power consumption or electromagnetic emanations of unprotected...
The pursuit of secure computation has always featured a tension between performance and security. Se...
This paper exposes some weaknesses of encrypted embedded memory in secure chips. Smartcards and secu...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Un nombre important et en constante augmentation de systèmes numériques nous entoure. Tablettes, sma...
Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved. This...
Current crypto implementations rely on software running under general-purpose operating systems alon...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
AbstractA high-speed pre-production superscalar microprocessor that ‘works encrypted’ is described h...
Following a sequence of hardware designs for a fully homomorphic crypto-processor - a general purpos...
© 2017 IEEE. Over the past few years we have articulated theory that describes 'encrypted computing'...
‘Encrypted computing’ is an approach to preventing insider attacks by the privileged operator agains...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
We ask whether two or more images of arithmetic may inhabit the same space via different encodings. ...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
Secret keys can be extracted from the power consumption or electromagnetic emanations of unprotected...
The pursuit of secure computation has always featured a tension between performance and security. Se...
This paper exposes some weaknesses of encrypted embedded memory in secure chips. Smartcards and secu...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Un nombre important et en constante augmentation de systèmes numériques nous entoure. Tablettes, sma...
Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved. This...
Current crypto implementations rely on software running under general-purpose operating systems alon...