| 11531750 |
Installing and manipulating a secure virtual machine image through an untrusted hypervisor |
David M. Durham, Karanvir S. Grewal, Michael LeMay |
2022-12-20 |
| 11496486 |
Methods and apparatus to support reliable digital communications without integrity metadata |
Michael E. Kounavis, Amitabh Das, Karanvir S. Grewal, David M. Durham |
2022-11-08 |
| 11469902 |
Systems and methods of using cryptographic primitives for error location, correction, and device recovery |
Michael E. Kounavis, David M. Durham, Karanvir S. Grewal |
2022-10-11 |
| 11429580 |
Collision-free hashing for accessing cryptographic computing metadata and for cache expansion |
Michael E. Kounavis, Santosh Ghosh, Michael LeMay, David M. Durham |
2022-08-30 |
| 11354423 |
Cryptographic isolation of memory compartments in a computing environment |
Michael E. Kounavis, Santosh Ghosh, Michael LeMay, David M. Durham |
2022-06-07 |
| 11321469 |
Microprocessor pipeline circuitry to support cryptographic computing |
Michael E. Kounavis, Santosh Ghosh, Michael LeMay, David M. Durham, Stanislav Shwartsman |
2022-05-03 |
| 11308225 |
Management of keys for use in cryptographic computing |
Michael E. Kounavis, Santosh Ghosh, David M. Durham |
2022-04-19 |
| 11301344 |
Aggregate GHASH-based message authentication code (MAC) over multiple cachelines with incremental updates |
David M. Durham, Karanvir S. Grewal, Michael E. Kounavis |
2022-04-12 |
| 11216556 |
Side channel attack prevention by maintaining architectural state consistency |
Ken Grewal, Ravi L. Sahita, David M. Durham, Erdem Aktas, Abhishek Basak |
2022-01-04 |