1

Confidential Computing or Cryptographic Computing? – Communications of the ACM