{"id":"https://openalex.org/W3039674186","doi":"https://doi.org/10.1109/tdsc.2020.3007066","title":"E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation","display_name":"E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation","publication_year":2020,"publication_date":"2020-07-06","ids":{"openalex":"https://openalex.org/W3039674186","doi":"https://doi.org/10.1109/tdsc.2020.3007066","mag":"3039674186"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2020.3007066","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3007066","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071386756","display_name":"Eduardo Chielle","orcid":"https://orcid.org/0000-0002-1938-912X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Eduardo Chielle","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0002-1938-912X","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064496184","display_name":"Nektarios Georgios Tsoutsos","orcid":"https://orcid.org/0000-0002-5769-0124"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nektarios Georgios Tsoutsos","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Delaware, Newark, DE, USA"],"raw_orcid":"https://orcid.org/0000-0002-5769-0124","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Delaware, Newark, DE, USA","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026224233","display_name":"Oleg Mazonka","orcid":"https://orcid.org/0000-0001-5131-9044"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Oleg Mazonka","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0001-5131-9044","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043325974","display_name":"Michail Maniatakos","orcid":"https://orcid.org/0000-0001-6899-0651"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michail Maniatakos","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0001-6899-0651","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071386756"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1359,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54819801,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"19","issue":"2","first_page":"848","last_page":"861"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8773235082626343},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6346826553344727},{"id":"https://openalex.org/keywords/microarchitecture","display_name":"Microarchitecture","score":0.5817735195159912},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5524592995643616},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.46254962682724},{"id":"https://openalex.org/keywords/locality","display_name":"Locality","score":0.4378284215927124},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.4329168200492859},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4223294258117676},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4083348214626312},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.40574556589126587},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.35025057196617126},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22462749481201172},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18878856301307678}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8773235082626343},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6346826553344727},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.5817735195159912},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5524592995643616},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.46254962682724},{"id":"https://openalex.org/C2779808786","wikidata":"https://www.wikidata.org/wiki/Q6664603","display_name":"Locality","level":2,"score":0.4378284215927124},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.4329168200492859},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4223294258117676},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4083348214626312},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.40574556589126587},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.35025057196617126},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22462749481201172},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18878856301307678},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2020.3007066","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3007066","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W76123274","https://openalex.org/W150223756","https://openalex.org/W1447175589","https://openalex.org/W1520270249","https://openalex.org/W1537849967","https://openalex.org/W1572300106","https://openalex.org/W1603331866","https://openalex.org/W1892798954","https://openalex.org/W1971286892","https://openalex.org/W1979483182","https://openalex.org/W1984641795","https://openalex.org/W1992291252","https://openalex.org/W2029675347","https://openalex.org/W2031533839","https://openalex.org/W2033050620","https://openalex.org/W2036329595","https://openalex.org/W2068143382","https://openalex.org/W2085933309","https://openalex.org/W2091895466","https://openalex.org/W2093909024","https://openalex.org/W2119028650","https://openalex.org/W2125730340","https://openalex.org/W2131728778","https://openalex.org/W2132172731","https://openalex.org/W2152926062","https://openalex.org/W2164327070","https://openalex.org/W2167535607","https://openalex.org/W2167804035","https://openalex.org/W2188260838","https://openalex.org/W2188327575","https://openalex.org/W2285334798","https://openalex.org/W2383940294","https://openalex.org/W2463516579","https://openalex.org/W2511192821","https://openalex.org/W2532499458","https://openalex.org/W2619630761","https://openalex.org/W2730221584","https://openalex.org/W2766545755","https://openalex.org/W2788636062","https://openalex.org/W2792498333","https://openalex.org/W2883613460","https://openalex.org/W2896386683","https://openalex.org/W2902229412","https://openalex.org/W2963311060","https://openalex.org/W4206314719","https://openalex.org/W4292003164","https://openalex.org/W6602304683","https://openalex.org/W6606067566","https://openalex.org/W6628569256","https://openalex.org/W6686955836","https://openalex.org/W6687118843","https://openalex.org/W6712237015","https://openalex.org/W6748685645","https://openalex.org/W6753443810","https://openalex.org/W6756049408"],"related_works":["https://openalex.org/W2133923912","https://openalex.org/W2096621412","https://openalex.org/W1920227747","https://openalex.org/W2089626839","https://openalex.org/W4248910437","https://openalex.org/W4251041146","https://openalex.org/W73537997","https://openalex.org/W44237209","https://openalex.org/W4285503988","https://openalex.org/W2134330827"],"abstract_inverted_index":{"The":[0,141],"rapid":[1],"increase":[2,109],"of":[3,13],"recent":[4],"privacy":[5],"attacks":[6,62],"has":[7],"significantly":[8],"decreased":[9],"trust":[10],"on":[11,48,155],"behalf":[12],"the":[14,53,68,84,99,105,120,130,163],"users.":[15],"A":[16],"root":[17],"cause":[18],"to":[19,60,135,196],"these":[20],"problems":[21],"is":[22,80,144],"that":[23,183],"modern":[24],"computer":[25],"architectures":[26],"have":[27],"always":[28],"been":[29],"designed":[30],"for":[31,138,171,184],"performance,":[32,110],"while":[33],"security":[34,41],"protections":[35],"are":[36,91],"traditionally":[37],"addressed":[38],"reactively.":[39],"Practical":[40],"protections,":[42],"such":[43],"as":[44],"Intel":[45],"SGX,":[46],"rely":[47],"processing":[49,197],"unencrypted":[50,198],"data":[51,79,90,113],"in":[52,83,104,119,129],"architectural":[54,85],"state,":[55],"which":[56],"leaves":[57],"them":[58,102],"exposed":[59],"software":[61],"(e.g.,":[63],"SGXpectre).":[64],"This":[65],"work":[66],"revisits":[67],"traditional":[69],"computation":[70,76,131],"stack":[71],"and":[72,98,151,167,181],"introduces":[73],"a":[74,174],"novel":[75],"paradigm,":[77],"where":[78],"never":[81],"decrypted":[82],"state.":[86,122],"Through":[87],"our":[88,159,190],"architecture,":[89],"protected":[92],"with":[93,186],"symmetric":[94],"or":[95],"asymmetric":[96],"encryption":[97],"programmer":[100],"manipulates":[101],"directly":[103],"encrypted":[106],"domain.":[107],"To":[108],"we":[111,161,177],"exploit":[112],"locality":[114],"by":[115],"introducing":[116],"decryption":[117],"caches":[118],"microarchitectural":[121],"Our":[123],"proposal":[124],"addresses":[125],"all":[126],"abstraction":[127],"levels":[128],"stack:":[132],"from":[133],"microarchitecture":[134],"library":[136],"support":[137],"high-level":[139],"programming.":[140],"proposed":[142],"architecture":[143,166,191],"instantiated":[145],"through":[146],"new":[147],"assembly":[148],"instructions,":[149],"registers":[150],"functional":[152],"units":[153],"operating":[154],"large":[156],"integers.":[157],"In":[158],"evaluation,":[160],"extend":[162],"OpenRISC":[164],"1000":[165],"develop":[168],"open-source":[169],"libraries":[170],"C++.":[172],"As":[173],"case":[175],"study,":[176],"employ":[178],"data-oblivious":[179],"benchmarks":[180,185],"observe":[182],"high":[187],"temporal":[188],"locality,":[189],"can":[192],"achieve":[193],"comparable":[194],"performance":[195],"data.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
