Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance microprocessor designed on the principle that a nonstandard arithmetic generates encrypted processor states is described here. Data in registers, in memory and on buses exists in encrypted form. Any block encryption is feasible, in principle. The processor is (initially) intended for cloud-based remote computation. An encrypted version of the standard OpenRISC instruction set is understood by the processor. It is proved here, for programs written in a minimal subset of instructions, that the platform is secure against ‘Iago’ attacks by the privileged operator or a subverted operating system, which cannot decrypt the program output, nor change th...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Specific hardware implementations of cryptographic algorithms have been subject to a number of “side...
MI6 is an aggressive, speculative out-of-order processor to support Secure Enclaves, which restore ...
AbstractA high-speed pre-production superscalar microprocessor that ‘works encrypted’ is described h...
Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.This ...
Following a sequence of hardware designs for a fully homomorphic crypto-processor - a general purpos...
‘Encrypted computing’ is an approach to preventing insider attacks by the privileged operator agains...
© 2017 IEEE. Over the past few years we have articulated theory that describes 'encrypted computing'...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
Secret keys can be extracted from the power consumption or electromagnetic emanations of unprotected...
The pursuit of secure computation has always featured a tension between performance and security. Se...
We ask whether two or more images of arithmetic may inhabit the same space via different encodings. ...
Secure computation research has gained traction internationally in the last five years. In the Unite...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
In the few years since the Raspberry Pi was released in 2012, countless microcomputers based on the ...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Specific hardware implementations of cryptographic algorithms have been subject to a number of “side...
MI6 is an aggressive, speculative out-of-order processor to support Secure Enclaves, which restore ...
AbstractA high-speed pre-production superscalar microprocessor that ‘works encrypted’ is described h...
Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.This ...
Following a sequence of hardware designs for a fully homomorphic crypto-processor - a general purpos...
‘Encrypted computing’ is an approach to preventing insider attacks by the privileged operator agains...
© 2017 IEEE. Over the past few years we have articulated theory that describes 'encrypted computing'...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
Secret keys can be extracted from the power consumption or electromagnetic emanations of unprotected...
The pursuit of secure computation has always featured a tension between performance and security. Se...
We ask whether two or more images of arithmetic may inhabit the same space via different encodings. ...
Secure computation research has gained traction internationally in the last five years. In the Unite...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
In the few years since the Raspberry Pi was released in 2012, countless microcomputers based on the ...
Recently, security on programs and data is strongly required in multitask open computer systems such...
Specific hardware implementations of cryptographic algorithms have been subject to a number of “side...
MI6 is an aggressive, speculative out-of-order processor to support Secure Enclaves, which restore ...