Cryptographic accelerator

Known as: Accelerator 
In computing, a cryptographic accelerator is a co-processor designed specifically to perform computationally intensive cryptographic operations… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The goal of this paper is representation of computing unit focused on implementation hardware cryptography accelerator. After… (More)
Is this relevant?
2008
2008
1383-7621/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.sysarc.2008.03.005 * Corresponding author. E-mail addresses… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
We propose a novel area/time efficient ECC processor architecture which performs all finite field arithmetic operations in the… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2006
2006
In this paper a novel scalable public-key processor architecture is presented that supports modular exponentiation and Elliptic… (More)
  • figure 1
  • figure 3
  • figure 2
  • table II
  • table I
Is this relevant?
Highly Cited
2006
Highly Cited
2006
A novel hardware architecture for elliptic curve cryptography (ECC) over GF(p) is introduced. This can perform the main prime… (More)
  • table I
  • figure 1
  • figure 2
  • table II
  • figure 3
Is this relevant?
2005
2005
We propose a cryptographic accelerator for IPsec by using the NEC electronics' dynamically reconfigurable processor (DRP). In our… (More)
  • figure 2
  • figure 4
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
2005
2005
Differential power analysis is widely recognized as an extremely powerful and low-cost technique to extract secret information… (More)
  • figure 2
  • figure 1
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
New, generic silicon architectures for implementing Montgomery’s multiplication algorithm are presented. These use Carry Save… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1999
1999
In this paper, we show that the statistical qualities of cryptographic basic operations are the reason for the excellent… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?