Virtual secure platform: A {Five-Stage} pipeline processor over {TFHE}

K Matsuoka, R Banno, N Matsumoto, T Sato… - 30th USENIX security …, 2021 - usenix.org
We present Virtual Secure Platform (VSP), the first comprehensive platform that implements
a multi-opcode general-purpose sequential processor over Fully Homomorphic Encryption …

Fully encrypted high-speed microprocessor architecture: the secret computer in simulation

PT Breuer, JP Bowen - International Journal of Critical …, 2019 - inderscienceonline.com
The architecture of an encrypted high-performance microprocessor designed on the
principle that a nonstandard arithmetic generates encrypted processor states is described …

On security in encrypted computing

PT Breuer, JP Bowen, E Palomar, Z Liu - Information and Communications …, 2018 - Springer
Encrypted computing is an emerging approach to security and privacy of user data on a
computing system with respect to the operating system and other powerful insiders as …

Superscalar encrypted RISC: The measure of a secret computer

P Breuer, J Bowen, E Palomar… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Appropriately modifying the arithmetic in a processor causes data to remain in encrypted
form throughout processing, providing a technical approach to privacy for the ordinary user …

The secret processor will go to the ball: Benchmark insider-proof encrypted computing

PT Breuer, JP Bowen, E Palomar… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
'Encrypted computing'is an approach to preventing insider attacks by the privileged operator
against the unprivileged user on a computing system. It requires a processor that works …

Encrypted computing: Speed, security and provable obfuscation against insiders

PT Breuer, JP Bowen, E Palomar… - … Carnahan Conference on …, 2017 - ieeexplore.ieee.org
Over the past few years we have articulated theory that describesencrypted computing', in
which data remains in encrypted form while being worked on inside a processor, by virtue of …

An information obfuscation calculus for encrypted computing

PT Breuer - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Relative cryptographic semantic security for encrypted words of user data at runtime holds in
the emerging field of encrypted computing, in conjunction with an appropriate instruction set …

High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer

PT Breuer - 2022 IEEE Conference on Dependable and Secure …, 2022 - ieeexplore.ieee.org
A signal-level open-source hardware definition for a superscalar processor delivering high-
speed 'encrypted computing'has been tested. This 'KPU'processor provides general purpose …

Compiled Obfuscation for Data Structures in Encrypted Computing

PT Breuer - arxiv preprint arxiv:1902.06146, 2019 - arxiv.org
Encrypted computing is an emerging technology based on a processor thatworks encrypted',
taking encrypted inputs to encrypted outputs while data remains in encrypted form …

Cryptographic Games

S Rass, S Schauer, S König, Q Zhu, S Rass… - Cyber-Security in Critical …, 2020 - Springer
The term “game” has substantially different meanings within the security area, depending on
whether we speak about cryptographic security in particular, or system security in a more …