Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,554 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic accelerator
Known as:
Accelerator
In computing, a cryptographic accelerator is a co-processor designed specifically to perform computationally intensive cryptographic operations…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Assembly language
Comparison of disk encryption software
Conventional PCI
Crypto API (Linux)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
A hierarchical formal approach to verifying side-channel resistant cryptographic processors
K. Okamoto
,
N. Homma
,
T. Aoki
,
S. Morioka
IEEE International Symposium on Hardware Oriented…
2014
Corpus ID: 6127611
This paper presents a hierarchical formal verification method for cryptographic processors based on a combination of a word-level…
Expand
2013
2013
A Unified Cryptographic Processor for RSA and ECC in RNS
Jizeng Wei
,
W. Guo
,
Hao Liu
,
Ya Tan
CCF National Conference on Computer Engineering…
2013
Corpus ID: 49478489
This paper proposes a unified and programmable crypto-processor with coarse-grained reconfigurable datapath to perform either RSA…
Expand
2012
2012
A Formal Approach to Designing Cryptographic Processors Based on $GF(2^m)$ Arithmetic Circuits
N. Homma
,
Kazuya Saito
,
T. Aoki
IEEE Transactions on Information Forensics and…
2012
Corpus ID: 15270364
This paper proposes a formal approach to designing Galois-field (GF) arithmetic circuits, which are widely used in modern…
Expand
2012
2012
Hardware and Security
Gedare Bloom
,
Eugen Leontie
,
B. Narahari
,
R. Simha
2012
Corpus ID: 11194147
2010
2010
A 521-bit dual-field elliptic curve cryptographic processor with power analysis resistance
Jen-Wei Lee
,
Yao-Lin Chen
,
C. Tseng
,
Hsie-Chia Chang
,
Chen-Yi Lee
Proceedings of ESSCIRC
2010
Corpus ID: 11425683
Recently, several hardware implementations for elliptic curve cryptography have been proposed but few of them considered the dual…
Expand
2008
2008
Area-Efficient Processor for Public-Key Cryptography in Wireless Sensor Networks
G. Murphy
,
E. Popovici
,
W. Marnane
International Conference on Sensor Technologies…
2008
Corpus ID: 17333705
This paper presents a versatile public-key cryptographic processor suitable for wireless sensor networks which uses minimal…
Expand
2007
2007
An Efficient Montgomery Multiplication Algorithm and RSA Cryptographic Processor
R. Garg
,
R. Vig
International Conference on Computational…
2007
Corpus ID: 9645769
New, generic silicon architecture for implementing Montgomery's multiplication algorithm is presented. This paper proposes an…
Expand
2007
2007
A High Performance ASIC Based Elliptic Curve Cryptographic Processor over GF(p)
Xiaopeng Zhang
,
Shuguo Li
International Design and Test Workshop
2007
Corpus ID: 44034490
In this paper, a high-performance ASIC based elliptic curve cryptographic (ECC) processor is proposed to implement six elliptic…
Expand
2007
2007
A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain
S. Baktir
,
Sandeep S. Kumar
,
C. Paar
,
B. Sunar
Mob. Networks Appl.
2007
Corpus ID: 2177994
We propose a novel area/time efficient elliptic curve cryptography (ECC) processor architecture which performs all finite field…
Expand
2001
2001
Scalable RSA Processor in Reconfigurable Hardware-a SoC Building Block
V. Fischer
,
M. Drutarovský
2001
Corpus ID: 7958979
The paper introduces a scalable programmable RSA cryptographic processor implemented as IP core in Field Programmable Devices…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE