메뉴 건너뛰기




Volumn , Issue , 2012, Pages 3-8

A secure processor architecture for encrypted computation on untrusted programs

Author keywords

Encrypted computation; Secure processors

Indexed keywords

ARITHMETIC INSTRUCTIONS; DATA MEMORY; ENCRYPTED DATA; MEMORY ACCESS PATTERNS; PERIODIC ACCESS; PROCESSOR ARCHITECTURES; RUNNING-IN; SECURE PROCESSORS; SOFTWARE STACKS; UNTRUSTED SERVER;

EID: 84869402047     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382536.2382540     Document Type: Conference Paper
Times cited : (114)

References (18)
  • 1
    • 51849104627 scopus 로고    scopus 로고
    • Trustzone: Integrated hardware and software security
    • July
    • Tiago Alves and Don Felton. Trustzone: Integrated hardware and software security. ARM white paper, July 2004.
    • (2004) ARM White Paper
    • Alves, T.1    Felton, D.2
  • 3
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC'09, pages 169-178, 2009.
    • (2009) STOC'09 , pp. 169-178
    • Gentry, C.1
  • 5
    • 0023547498 scopus 로고
    • Towards a theory of software protection and simulation on oblivious rams
    • O. Goldreich. Towards a theory of software protection and simulation on oblivious rams. In STOC, 1987.
    • (1987) STOC
    • Goldreich, O.1
  • 6
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Oded Goldreich and Rafail Ostrovsky. Software Protection and Simulation on Oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996. (Pubitemid 126607640)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 7
    • 52249100000 scopus 로고    scopus 로고
    • Cpu2006 working set size
    • March
    • Darryl Gove. Cpu2006 working set size. SIGARCH Comput. Archit. News, 35(1):90-96, March 2007.
    • (2007) SIGARCH Comput. Archit. News , vol.35 , Issue.1 , pp. 90-96
    • Gove, D.1
  • 9
    • 85076877909 scopus 로고    scopus 로고
    • Trinc: Small trusted hardware for large distributed systems
    • Dave Levin, John R. Douceur, Jacob R. Lorch, and Thomas Moscibroda. Trinc: Small trusted hardware for large distributed systems. In NSDI, 2009.
    • (2009) NSDI
    • Levin, D.1    Douceur, J.R.2    Lorch, J.R.3    Moscibroda, T.4
  • 11
    • 82955198779 scopus 로고
    • Efficient computation on oblivious rams
    • R. Ostrovsky. Efficient computation on oblivious rams. In STOC, 1990.
    • (1990) STOC
    • Ostrovsky, R.1
  • 15
    • 85180805635 scopus 로고    scopus 로고
    • Towards practical oblivious ram
    • E. Stefanov, E. Shi, and D. Song. Towards practical oblivious ram. In NDSS, 2012.
    • (2012) NDSS
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 18
    • 0004196480 scopus 로고
    • PhD thesis, Carnegie Mellon University
    • Bennet S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994.
    • (1994) Using Secure Coprocessors
    • Yee, B.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.