References

View a list of documents referenced in this white paper.

[1]
Bornträger et al, Secure your cloud workloads with IBM Secure Execution for Linux on IBM z15 and LinuxONE III, in IBM Journal of R&D, vol. 64, 2020
https://ieeexplore.ieee.org/document/9138728
[2]
Introducing IBM Secure Execution for Linux,
https://www.ibm.com/docs/en/linux-on-systems?topic=security-introducing-secure-execution-linux
[3]
CEX8S / 4770 overview,
https://www.ibm.com/security/cryptocards/pciecc4/overview
[4]
Linux on IBM Z and LinuxONE Device Drivers, Features and Commands,
https://www.ibm.com/docs/en/linux-on-systems?topic=configuration-device-drivers-features-commands
[5]
z/Architecture Principles of Operations, SA22-7812-xx,
https://publibfp.dhe.ibm.com/epubs/pdf/a227832d.pdf
[6]
IBM z16 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX8S with Quantum-Safe CRYSTALS algorithms)
https://ibm.biz/Bdnyzw
[7]
openCryptoki - An open source implementation of PKCS #11,
https://www.ibm.com/docs/en/linux-on-systems?topic=support-opencryptoki-open-source-pkcs-11
[8]
Pervasive Encryption,
https://www.ibm.com/docs/en/linux-on-systems?topic=security-pervasive-encryption
[9]
libzpc - A Protected-Key Cryptographic Library,
https://www.ibm.com/docs/en/linux-on-systems?topic=support-libzpc-protected-key-cryptographic-library
[10]
Maeany et al, IBM zEnterprise redundant array of independent memory subsystem, in IBM Journal of R&D, vol. 56, 2012
https://ieeexplore.ieee.org/document/6136239