We propose "secret-protected (SP)" architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of critical secrets, and key protection and management is a fundamental problem -- often assumed but not solved -- underlying the use of cryptographic protection of sensitive files, messages, data and programs. SP-processor
The increasing need for security has caused system designers to consider placing some security suppo...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Recently, security on programs and data is strongly required in multitask open computer systems such...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
The amount of digital data generated and stored by users increases every day. In order to protect th...
AbstractA high-speed pre-production superscalar microprocessor that ‘works encrypted’ is described h...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
The increasing need for security has caused system designers to consider placing some security suppo...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Recently, security on programs and data is strongly required in multitask open computer systems such...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
The amount of digital data generated and stored by users increases every day. In order to protect th...
AbstractA high-speed pre-production superscalar microprocessor that ‘works encrypted’ is described h...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
The increasing need for security has caused system designers to consider placing some security suppo...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...