
Ep 8: Durable Security and Privacy-enhanced Computing with Dr. Todd Austin, University of Michigan
Computer Architecture Podcast
00:00
The Durability of Cyphers
Bisthop: Even f h finds interesting applications. We're about 50 off native ind ore in our initial product right now, which is literally thousands en other technologies. If you integrate this, webrand jm, five simulations, you integrate this te into the pipe line. You can get within two s, no problem. Of that two x, only a quarter of that is exposed incription, latency. The rest is exposed elgarithm changes. But even then, we can find some pretty interesting appation.
Play episode from 28:18
Transcript


