Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,995,830 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic accelerator
Known as:
Accelerator
In computing, a cryptographic accelerator is a co-processor designed specifically to perform computationally intensive cryptographic operations…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Assembly language
Comparison of disk encryption software
Conventional PCI
Crypto API (Linux)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Modular Multiplication Algorithm in Cryptographic Processor: A Review and Future Directions
Dr. Sathish Kumar
,
G. A. Professor
2017
Corpus ID: 212526728
: The strength of public-key cryptography depends on the degree of difficulty of a private key to be determined from its…
Expand
2012
2012
Efficient Hardware Implementation of an Elliptic Curve Cryptographic Processor Over GF (2 163)
M. Masoumi
,
H. Mahdizadeh
2012
Corpus ID: 31824362
A new and highly efficient architecture for elliptic curve scalar point multiplication which is optimized for a binary field…
Expand
2012
2012
Hardware and Security
Gedare Bloom
,
Eugen Leontie
,
B. Narahari
,
R. Simha
2012
Corpus ID: 11194147
2012
2012
A Formal Approach to Designing Cryptographic Processors Based on $GF(2^m)$ Arithmetic Circuits
N. Homma
,
Kazuya Saito
,
T. Aoki
IEEE Transactions on Information Forensics and…
2012
Corpus ID: 15270364
This paper proposes a formal approach to designing Galois-field (GF) arithmetic circuits, which are widely used in modern…
Expand
2010
2010
A 521-bit dual-field elliptic curve cryptographic processor with power analysis resistance
Jen-Wei Lee
,
Yao-Lin Chen
,
C. Tseng
,
Hsie-Chia Chang
,
Chen-Yi Lee
Proceedings of ESSCIRC
2010
Corpus ID: 11425683
Recently, several hardware implementations for elliptic curve cryptography have been proposed but few of them considered the dual…
Expand
2008
2008
Efficient FPGA elliptic curve cryptographic processor over GF(2m)
S. Antão
,
R. Chaves
,
L. Sousa
International Conference on Field-Programmable…
2008
Corpus ID: 27024004
In this paper a processor that supports elliptic curve cryptographic applications over GF (2m) is proposed. The proposed…
Expand
2008
2008
Area-Efficient Processor for Public-Key Cryptography in Wireless Sensor Networks
G. Murphy
,
E. Popovici
,
W. Marnane
International Conference on Sensor Technologies…
2008
Corpus ID: 17333705
This paper presents a versatile public-key cryptographic processor suitable for wireless sensor networks which uses minimal…
Expand
2007
2007
An Efficient Montgomery Multiplication Algorithm and RSA Cryptographic Processor
R. Garg
,
R. Vig
International Conference on Computational…
2007
Corpus ID: 9645769
New, generic silicon architecture for implementing Montgomery's multiplication algorithm is presented. This paper proposes an…
Expand
2001
2001
Scalable RSA Processor in Reconfigurable Hardware-a SoC Building Block
V. Fischer
,
M. Drutarovský
2001
Corpus ID: 7958979
The paper introduces a scalable programmable RSA cryptographic processor implemented as IP core in Field Programmable Devices…
Expand
2001
2001
Optimal Datapath Design for a Cryptographic Processor: The Blowfish Algorithm
N. Ali
,
J. Noras
2001
Corpus ID: 62647396
BLOWFISH is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. This paper reports…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE