Virtual secure platform: A {Five-Stage} pipeline processor over {TFHE}
We present Virtual Secure Platform (VSP), the first comprehensive platform that implements
a multi-opcode general-purpose sequential processor over Fully Homomorphic Encryption …
a multi-opcode general-purpose sequential processor over Fully Homomorphic Encryption …
Fully encrypted high-speed microprocessor architecture: the secret computer in simulation
The architecture of an encrypted high-performance microprocessor designed on the
principle that a nonstandard arithmetic generates encrypted processor states is described …
principle that a nonstandard arithmetic generates encrypted processor states is described …
On security in encrypted computing
Encrypted computing is an emerging approach to security and privacy of user data on a
computing system with respect to the operating system and other powerful insiders as …
computing system with respect to the operating system and other powerful insiders as …
Superscalar encrypted RISC: The measure of a secret computer
Appropriately modifying the arithmetic in a processor causes data to remain in encrypted
form throughout processing, providing a technical approach to privacy for the ordinary user …
form throughout processing, providing a technical approach to privacy for the ordinary user …
The secret processor will go to the ball: Benchmark insider-proof encrypted computing
'Encrypted computing'is an approach to preventing insider attacks by the privileged operator
against the unprivileged user on a computing system. It requires a processor that works …
against the unprivileged user on a computing system. It requires a processor that works …
Encrypted computing: Speed, security and provable obfuscation against insiders
Over the past few years we have articulated theory that describesencrypted computing', in
which data remains in encrypted form while being worked on inside a processor, by virtue of …
which data remains in encrypted form while being worked on inside a processor, by virtue of …
An information obfuscation calculus for encrypted computing
PT Breuer - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Relative cryptographic semantic security for encrypted words of user data at runtime holds in
the emerging field of encrypted computing, in conjunction with an appropriate instruction set …
the emerging field of encrypted computing, in conjunction with an appropriate instruction set …
High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer
PT Breuer - 2022 IEEE Conference on Dependable and Secure …, 2022 - ieeexplore.ieee.org
A signal-level open-source hardware definition for a superscalar processor delivering high-
speed 'encrypted computing'has been tested. This 'KPU'processor provides general purpose …
speed 'encrypted computing'has been tested. This 'KPU'processor provides general purpose …
Compiled Obfuscation for Data Structures in Encrypted Computing
PT Breuer - arxiv preprint arxiv:1902.06146, 2019 - arxiv.org
Encrypted computing is an emerging technology based on a processor thatworks encrypted',
taking encrypted inputs to encrypted outputs while data remains in encrypted form …
taking encrypted inputs to encrypted outputs while data remains in encrypted form …
Cryptographic Games
The term “game” has substantially different meanings within the security area, depending on
whether we speak about cryptographic security in particular, or system security in a more …
whether we speak about cryptographic security in particular, or system security in a more …