Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

IBM 4758

Known as: 4758 
The IBM 4758 PCI Cryptographic Coprocessor is a secure cryptoprocessor implemented on a high-security, tamper resistant, programmable PCI board… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This paper presents a crowdsourcing project on the creation of a publicly available corpus of sentential paraphrases for Russian… Expand
Is this relevant?
2011
2011
Growth studies were conducted on green algae Chlorella, Scenedesmus and Haematococcus strains in batch mode cultures. In this… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In the fall of 2005, former chairman of Yukos Oil, Mikhail Khodorkovsky, was sentenced to prison, after being found guilty of… Expand
Is this relevant?
2005
2005
In this paper, we suggest an extension to the database-as-a-service (DAS) model that introduces a secure coprocessor (SC) at an… Expand
  • figure 1
  • figure 2
Is this relevant?
2004
2004
We consider how related-key attacks can be mounted on the IBM 4758 cryptoprocessor, and also show that its EDEx multiple mode is… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • A. Iliev, S. Smith
  • International Information Security Workshops
  • 2004
  • Corpus ID: 16774252
In Private Information Retrieval (PIR), a user obtains one of N records from a server, without the server learning what record… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Meeting the challenge of building a user-configurable secure coprocessor provided several lessons in hardware and software… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Source(s) V. Erceg, Iospan Wireless Inc., USA K.V. S. Hari, Stanford University, USA M.S. Smith, Nortel Networks, GB D.S. Baum… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Too often, "security of Web transactions" reduces to "encryption of the channel" - and neglects to address what happens at the… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2000
2000
An attack on the implementation of control vectors in the IBM Common Cryptographic Architecture is presented. The final key−part… Expand
Is this relevant?