Skip to search formSkip to main contentSkip to account menu

IBM 4764

The IBM 4764 Cryptographic Coprocessor is a secure cryptoprocessor that performs cryptographic operations used by application programs and by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The hardware architecture of reconfigurable cryptographic processors is the customization of the generic reconfigurable computing… 
2018
2018
RCE (Resource Constrained Environment) is known for its stringent hardware design requirements. With the rise of Internet of… 
2017
2017
This paper presents an efficient approach to verifying higher-degree Galois-field (GF) arithmetic circuits. The proposed method… 
2014
2014
This paper presents a hierarchical formal verification method for cryptographic processors based on a combination of a word-level… 
2009
2009
This paper presents the design of a multiple-valued adder for tamper-resistant cryptographic processors. The proposed adder is… 
2008
2008
In this paper we describe a novel approach for speeding up the computations of characteristic 2 elliptic curve cryptography… 
Review
2007
Review
2007
Most electronic voting solutions have so far been complex and correspondingly difficult for regulators to validate. The full… 
2006
2006
Biometrics is nowadays one of the most promising techniques in authentication. Biometrics intends to identify a user by his/her… 
2005
2005
We present a novel VLSI architecture for division and multiplication in GF(2m), aimed at applications in low cost elliptic curve… 
Review
1995
Review
1995
  • L. Hoffman
  • 1995
  • Corpus ID: 5432121
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper…