Author:
Breuer Peter T.,Pickin Simon J.
Publisher
Springer International Publishing
Reference24 articles.
1. Lecture Notes in Computer Science;PT Breuer,2013
2. Breuer, P., Bowen, J.: Chaotic compilation: a (statistical) cloak for a secret computer. In: Proceedings of 1st Annual International Workshop SW/HW Interaction Faults (SHIFT 2019), IEEE International Symposium on SW Reliability Engineering Workshops (ISSREW 2019), CA, USA, pp. 428–433. IEEE, October 2019.
https://doi.org/10.1109/ISSREW.2019.00106
3. Breuer, P., Bowen, J.: A fully encrypted high-speed microprocessor architecture: the secret computer in simulation. Int. J. Crit. Comput.-Based Sys. 9(1/2), 26–55 (2019).
https://doi.org/10.1504/IJCCBS.2019.10020015
4. Breuer, P., Bowen, J.: (Un)encrypted computing and indistinguishability obfuscation, January 2019.
http://arxiv.org/abs/1811.12365v1
. Principles of Secure Compilation (PriSC 2019) at 46th ACM Symposium on Principles of Programming Languages (POPL 2019)
5. Breuer, P., Bowen, J., Palomar, E., Liu, Z.: A practical encrypted microprocessor. In: Callegari, C., et al. (eds.) Proceedings of 13th International Conference on Security and Cryptography (SECRYPT 2016), Port, vol. 4, pp. 239–250. SCITEPRESS, July 2016.
https://doi.org/10.5220/0005955902390250