References
View a list of documents referenced in this white paper.
- [1]
- Bornträger et al, Secure your cloud workloads with IBM Secure Execution for Linux on IBM
z15 and LinuxONE III, in IBM Journal of R&D, vol. 64, 2020
https://ieeexplore.ieee.org/document/9138728 - [2]
- Introducing IBM Secure Execution for Linux,
https://www.ibm.com/docs/en/linux-on-systems?topic=security-introducing-secure-execution-linux - [3]
- CEX8S / 4770 overview,
https://www.ibm.com/security/cryptocards/pciecc4/overview - [4]
- Linux on IBM Z and LinuxONE Device Drivers, Features and Commands,
https://www.ibm.com/docs/en/linux-on-systems?topic=configuration-device-drivers-features-commands - [5]
- z/Architecture Principles of Operations, SA22-7812-xx,
https://publibfp.dhe.ibm.com/epubs/pdf/a227832d.pdf - [6]
- IBM z16 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX8S with
Quantum-Safe CRYSTALS
algorithms)
https://ibm.biz/Bdnyzw - [7]
- openCryptoki - An open source implementation of PKCS #11,
https://www.ibm.com/docs/en/linux-on-systems?topic=support-opencryptoki-open-source-pkcs-11 - [8]
- Pervasive Encryption,
https://www.ibm.com/docs/en/linux-on-systems?topic=security-pervasive-encryption - [9]
- libzpc - A Protected-Key Cryptographic Library,
https://www.ibm.com/docs/en/linux-on-systems?topic=support-libzpc-protected-key-cryptographic-library - [10]
- Maeany et al, IBM zEnterprise redundant array of independent memory subsystem, in
IBM Journal of R&D, vol. 56,
2012
https://ieeexplore.ieee.org/document/6136239