Hardware-Supported Cryptographic Protection of Random Access Memory

R Avanzi, I Mihalcea, D Schall, H Montaner… - Cryptology ePrint …, 2022 - eprint.iacr.org
Confidential Computing is the protection of data in use from access or modification by any
unauthorized agent, including privileged software. For example, in Intel SGX (Client and …

A Trial to Embed RAM Encryption Scheme in Cryptographic Programs

T Matsumoto, J Sakamoto, M Suzuki… - Journal of Information …, 2023 - jstage.jst.go.jp
The RAM encryption encrypts the data on memory to prevent data leakage from an
adversary to eavesdrop the memory space of the target program. The well-known …