Computer Architecture Podcast cover image

Ep 8: Durable Security and Privacy-enhanced Computing with Dr. Todd Austin, University of Michigan

Computer Architecture Podcast

00:00

The Durability of Cyphers

Bisthop: Even f h finds interesting applications. We're about 50 off native ind ore in our initial product right now, which is literally thousands en other technologies. If you integrate this, webrand jm, five simulations, you integrate this te into the pipe line. You can get within two s, no problem. Of that two x, only a quarter of that is exposed incription, latency. The rest is exposed elgarithm changes. But even then, we can find some pretty interesting appation.

Play episode from 28:18
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app