Protecting Sensitive Data through Novel Algorithm Transformations and Algebraic Splitting
Small Business Information
3000 Kent Avenue, Purdue Technology Center, West Lafayette, IN, 47906
AbstractThis Phase II proposal extends the technique developed during Phase I for protecting CPI into a commercially viable and generally applicable source-to-source transformation engine. In addition, we expand the Phase I approach to support high-performance secure computation through careful division of tasks, between a slower secured processor, and multiple high-performance general-purpose COTS processors, through the process of secure outsourcing.
* information listed above is at the time of submission.