‘Encrypted computing’ is an approach to preventing insider attacks by the privileged operator against the unprivileged user on a computing system. It requires a processor that works natively on encrypted data in user mode, and the security barrier that protects the user is hardware-based encryption, not access. We report on progress and practical experience with our superscalar RISC class prototype processor for encrypted computing and supporting software infrastructure. This paper aims to alert the secure hardware community that encrypted computing is possibly practical, as well as theoretically plausible. It has been shown formally impossible for operator mode to read (or write to order) the plaintext form of data originating from or bein...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
© 2017 IEEE. Over the past few years we have articulated theory that describes 'encrypted computing'...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
AbstractA high-speed pre-production superscalar microprocessor that ‘works encrypted’ is described h...
Following a sequence of hardware designs for a fully homomorphic crypto-processor - a general purpos...
Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.This ...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
We ask whether two or more images of arithmetic may inhabit the same space via different encodings. ...
Secret keys can be extracted from the power consumption or electromagnetic emanations of unprotected...
Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved. This...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
© 2017 IEEE. Over the past few years we have articulated theory that describes 'encrypted computing'...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
AbstractA high-speed pre-production superscalar microprocessor that ‘works encrypted’ is described h...
Following a sequence of hardware designs for a fully homomorphic crypto-processor - a general purpos...
Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.This ...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
We ask whether two or more images of arithmetic may inhabit the same space via different encodings. ...
Secret keys can be extracted from the power consumption or electromagnetic emanations of unprotected...
Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved. This...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...