Cited By
View all- Wang JHuang TWu SLiu Z(2024)Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer AuthenticationIACR Communications in Cryptology10.62056/a3n59qgxqOnline publication date: 8-Jul-2024
- Fukuyama MTanaka MOgino RKawashima H(2024)eSilo: Making Silo Secure with SGXInternational Journal of Networking and Computing10.15803/ijnc.14.2_20614:2(206-224)Online publication date: 2024
- Mo FTarkhani ZHaddadi H(2024)Machine Learning with Confidential Computing: A Systematization of KnowledgeACM Computing Surveys10.1145/367000756:11(1-40)Online publication date: 3-Jun-2024
- Show More Cited By