| 12219057 |
Implementing trusted executing environments across multiple processor devices |
Philip J. Rogers, Mark A. Overby, Michael A. Woodmansee, Vyas Venkataraman, Naveen Cherukuri +4 more |
2025-02-04 |
| 12141268 |
Secure execution for multiple processor devices using trusted executing environments |
Philip J. Rogers, Mark A. Overby, Michael A. Woodmansee, Vyas Venkataraman, Naveen Cherukuri +4 more |
2024-11-12 |
| 12001592 |
Protecting against resets by untrusted software during cryptographic operations |
Anuj Kumar RAO, Adam Hendrickson, Vaishali Kulkarni, Naveen Cherukuri |
2024-06-04 |
| 11966480 |
Fairly utilizing multiple contexts sharing cryptographic hardware |
Adam Hendrickson, Vaishali Kulkarni, Naveen Cherukuri, Wish Gandhi, Raymond Hoi Man Wong |
2024-04-23 |
| 11698869 |
Computing an authentication tag for partial transfers scheduled across multiple direct memory access (DMA) engines |
Vaishali Kulkarni, Naveen Cherukuri, Raymond Hoi Man Wong, Adam Hendrickson, Wish Gandhi |
2023-07-11 |