Computer Architecture Podcast cover image

Ep 8: Durable Security and Privacy-enhanced Computing with Dr. Todd Austin, University of Michigan

Computer Architecture Podcast

00:00

Using the Elgarithm for High Performance Architecture

There's this fundamental tension between high performance design, optimizing the comic case and sharing resources so you don't need more transitors than you need. When an untrusted and a trusted entity share the same piece of hardware, the untrusted entity can infer information about what the trusted entity is doing. The time dilation will be proportional to the number of ones and zeros within that part of the key. So those interactions are the shearing of the cash and the optimizing of latency. It's one thing we've figured in the last few years, it is really hard to stop those things. You've ben focus on the cash, and people move the b t b, focus on

Play episode from 06:09
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app