Learn how to use the Intel SGX Remote Attestation flow, where a client's enclave can attest to a remote entity that it is trusted, and establish an authenticated communication channel with that entity.
This application demonstrates the use of Intel® SGX to protect the private key of an asymmetric ECC 256 key pair.
A means of probing for selected CPU features without exiting an Intel SGX enclave.
Use the Linux* kernel KVM virtualization module and the QEMU* VMM to virtualize Intel® SGX, then create a VM with access to Intel SGX in the guest OS.
Ecosystem Support for EEA* Trusted Compute Specification v1.0 Improves Blockchain Privacy and ScalabilityDevelopers can use the EEA* Trusted Compute Spec v1.0 to extend blockchain computational trust to off-chain compute capacity.
Imagine a world in which your drone or robot malfunctions and is lost in the wilderness, but you can summon a rescue robot to retrieve it.
Protecting data is critical to all who connect to the digital world, and Intel leads that effort with innovative technologies and solutions.
This guide steps through the process of setting up the Intel SGX Card
Homomorphic encryption opens up new possibilities by enabling computer calculations on encrypted information without decrypting it.