A Fully Homomorphic Crypto-Processor Design
- 1 January 2013
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- Typed Assembler for a RISC Crypto-ProcessorLecture Notes in Computer Science, 2012
- Fully homomorphic encryption using ideal latticesPublished by Association for Computing Machinery (ACM) ,2009
- CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage ProtectionTwenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2006
- Cryptonite – A Programmable Crypto Processor Architecture for High-Bandwidth ApplicationsLecture Notes in Computer Science, 2004
- AES and the cryptonite crypto processorPublished by Association for Computing Machinery (ACM) ,2003
- Architectural support for copy and tamper resistant softwareACM SIGPLAN Notices, 2000
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996
- Description of a new variable-length key, 64-bit block cipher (Blowfish)Lecture Notes in Computer Science, 1994
- Towards a theory of software protection and simulation by oblivious RAMsPublished by Association for Computing Machinery (ACM) ,1987
- Reduced instruction set computersCommunications of the ACM, 1985