Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

IBM 4758

Known as: 4758 
The IBM 4758 PCI Cryptographic Coprocessor is a secure cryptoprocessor implemented on a high-security, tamper resistant, programmable PCI board… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This paper presents a crowdsourcing project on the creation of a publicly available corpus of sentential paraphrases for Russian… Expand
Review
2007
Review
2007
Using monthly GDP forecasts from Consensus Economics Inc. for 18 developed countries reported over 24 different forecast horizons… Expand
  • table 1
  • figure 2
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2007
Highly Cited
2007
In the fall of 2005, former chairman of Yukos Oil, Mikhail Khodorkovsky, was sentenced to prison, after being found guilty of… Expand
2007
2007
Records from Ocean Drilling Program Sites 1057 and 1059 (2584 m and 2985 m water depth, respectively) have been used to… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
2005
2005
The present study investigated the relationship between Jung's personality types and psychometric intelligence. A total of 4758… Expand
2004
2004
We consider how related-key attacks can be mounted on the IBM 4758 cryptoprocessor, and also show that its EDEx multiple mode is… Expand
Highly Cited
2001
Highly Cited
2001
Meeting the challenge of building a user-configurable secure coprocessor provided several lessons in hardware and software… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2001
Highly Cited
2001
Too often, "security of Web transactions" reduces to "encryption of the channel" - and neglects to address what happens at the… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
2000
2000
An attack on the implementation of control vectors in the IBM Common Cryptographic Architecture is presented. The final key−part… Expand
Review
2000
Review
2000
As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing… Expand