Approaches to System Security: Using Cryptographic Techniques to Minimize Trust
ACM Sigarch
OCTOBER 4, 2018
This is the first post in a series of posts on different approaches to systems security especially as they apply to hardware and architectural security. The class of techniques described in this blog post, which we broadly refer to as applied hardware and architecture cryptography, apply proven cryptographic techniques to strengthen systems.
Let's personalize your content