2013
DOI: 10.1007/978-3-642-41224-0_2
|View full text |Cite
|
Sign up to set email alerts
|

Investigating the Application of One Instruction Set Computing for Encrypted Data Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…It is missing longjmp and efficient strings (char and short are the same size as int). It is intended for use in encrypted computing [13], [14], [15], [16], [17], [18], an emerging processor technology in which inputs, outputs, and all intermediate values in registers and memory are in encrypted form. Because good encryption is one-to-many, and addresses are data like any other, many physically different bit sequences (the 'ciphertext') represent the address intended by the programmer (the 'plaintext'), and platforms exhibit hardware aliasing at every memory access, providing a testbed for theory and practice.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…It is missing longjmp and efficient strings (char and short are the same size as int). It is intended for use in encrypted computing [13], [14], [15], [16], [17], [18], an emerging processor technology in which inputs, outputs, and all intermediate values in registers and memory are in encrypted form. Because good encryption is one-to-many, and addresses are data like any other, many physically different bit sequences (the 'ciphertext') represent the address intended by the programmer (the 'plaintext'), and platforms exhibit hardware aliasing at every memory access, providing a testbed for theory and practice.…”
Section: Methodsmentioning
confidence: 99%
“…It occupies two words on the stack at displacements k and k ′ (the value k+1) respectively from the stack pointer. The compiler generates accesses to the fields x.a and x.b just as it would for any local variables situated there, by calling lw r k(sp) # load from x.a (15) to read from x.a, for example. The effective address passed to memory is sp+k.…”
Section: Data Typesmentioning
confidence: 99%
See 1 more Smart Citation
“…In using the Paillier encryption we follow (Tsoutsos and Maniatakos, 2013;Tsoutsos and Maniatakos, 2015), where a 'one instruction' stack machine architecture ('HEROIC') for encrypted computing embedding a 16-bit Paillier encryption is prototyped. In conjunction with a lookup table for the signs (positive/negative) of encrypted data, the Paillier addition is computationally complete (any computable function can be implemented using addition, the table, an encrypted 1, and recursion), and addition, subtraction, and comparison machine code instructions suffice to write software routines for the rest.…”
Section: Overview and Related Workmentioning
confidence: 99%
“…Several fast processors for encrypted computing are described in [14]. Those include the 32-bit KPU [15] with 128bit AES encryption [16], which benchmarks at approximately the speed of a 433 MHz classic Pentium, and the slightly older 16-bit HEROIC [17], [18] with 2048-bit Paillier encryption [19], which runs like a 25 KHz Pentium, as well as the recently announced CryptoBlaze [20], 10× faster.…”
Section: Introductionmentioning
confidence: 99%