2012
DOI: 10.1147/jrd.2011.2178736
|View full text |Cite
|
Sign up to set email alerts
|

IBM 4765 cryptographic coprocessor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 1 publication
0
14
0
Order By: Relevance
“…TrustedDB TrustedDB is an SQL database processing engine that makes use of IBM 4764/5 cryptographic coprocessors [10] to run custom queries securely [12]. Coprocessors offer several cryptographic schemes such as the Advanced Encryption Standard (AES), the Triple Data Encryption Standard (3DES), RSA, pseu-dorandom number generation and cryptographic hash functions.…”
Section: Secure Trusted Hardwarementioning
confidence: 99%
“…TrustedDB TrustedDB is an SQL database processing engine that makes use of IBM 4764/5 cryptographic coprocessors [10] to run custom queries securely [12]. Coprocessors offer several cryptographic schemes such as the Advanced Encryption Standard (AES), the Triple Data Encryption Standard (3DES), RSA, pseu-dorandom number generation and cryptographic hash functions.…”
Section: Secure Trusted Hardwarementioning
confidence: 99%
“…The authors propose the use of a fully trusted party (a trusted hardware module [1], [2] in their case) to make a cryptographically secure SSE scheme efficient and sketch a construction for relational databases.…”
Section: Introductionmentioning
confidence: 99%
“…The IBM 4765 [1] cryptographic coprocessor resembles a general-purpose computer, encased in a tamper-proof housing and packed onto a PCIe card. Its security policies require that most access to the persistent storage be brokered through the built-in bootloader, and in particular its subsystem called the Persistent Memory Manager (PMM).…”
Section: Introductionmentioning
confidence: 99%
“…Figure 1 shows its call graph. The complexity of implementation, and thus also reasoning, caused by the non-determinism of (2) is then further aggravated by (1), since longer implementations induce new restart points.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation