Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,495 papers from all fields of science
Search
Sign In
Create Free Account
IBM 4758
Known as:
4758
The IBM 4758 PCI Cryptographic Coprocessor is a secure cryptoprocessor implemented on a high-security, tamper resistant, programmable PCI board…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Cryptography
IBM 4764
LibreSSL
Microprocessor
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Construction of a Russian Paraphrase Corpus: Unsupervised Paraphrase Extraction
Ekaterina V. Pronoza
,
E. Yagunova
,
A. Pronoza
Russian Summer School on Information Retrieval
2015
Corpus ID: 31934703
This paper presents a crowdsourcing project on the creation of a publicly available corpus of sentential paraphrases for Russian…
Expand
2010
2010
Estimating International Transmission of Shocks Using GDP Forecasts: India and Its Trading Partners
K. Lahiri
,
G. Isiklar
2010
Corpus ID: 16478523
Using a Factor Structural Vector Autoregressive (FSVAR) model and monthly GDP growth forecasts during 1995-2003, we find that…
Expand
2005
2005
Intelligence in relation to Jung's personality types
A. Furnham
,
J. Moutafi
,
L. Paltiel
2005
Corpus ID: 37008253
The present study investigated the relationship between Jung's personality types and psychometric intelligence. A total of 4758…
Expand
2005
2005
Incorporating a secure coprocessor in the database-as-a-service model
Einar Mykletun
,
G. Tsudik
International Workshop on Information Assurance
2005
Corpus ID: 1212134
In this paper, we suggest an extension to the database-as-a-service (DAS) model that introduces a secure coprocessor (SC) at an…
Expand
Highly Cited
2004
Highly Cited
2004
Private Information Storage with Logarithm-Space Secure Hardware
A. Iliev
,
Sean W. Smith
International Information Security Workshops
2004
Corpus ID: 16774252
In Private Information Retrieval (PIR), a user obtains one of N records from a server, without the server learning what record…
Expand
2004
2004
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor
R. Phan
,
H. Handschuh
Information Security Conference
2004
Corpus ID: 30652265
We consider how related-key attacks can be mounted on the IBM 4758 cryptoprocessor, and also show that its EDEx multiple mode is…
Expand
2002
2002
Floral resources of Karnataka: a geographic perspective
K. Ganeshaiah
,
Sagar V. Kathuria
,
R. Shaanker
2002
Corpus ID: 67787491
We compiled the data on the floral resources of Karnataka from diverse published sources and analysed the geographic patterns of…
Expand
2001
2001
Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor
Nick Howgrave-Graham
,
Joan G. Dyer
,
R. Gennaro
Workshop on Cryptographic Hardware and Embedded…
2001
Corpus ID: 14779777
In this paper we explore pseudo-random number generation on the IBM 4758 Secure Crypto Coprocessor. In particular we compare…
Expand
2000
2000
A Chosen Key Difference Attack on Control Vectors
M. Bond
2000
Corpus ID: 14683860
An attack on the implementation of control vectors in the IBM Common Cryptographic Architecture is presented. The final key−part…
Expand
Review
1999
Review
1999
Is sex in the details?
Seger
1999
Corpus ID: 86405782
The architect Mies van der Rohe is supposed to have said `God is in the details'. I have always taken this to mean that life…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE