Skip to search formSkip to main contentSkip to account menu

IBM 4764

The IBM 4764 Cryptographic Coprocessor is a secure cryptoprocessor that performs cryptographic operations used by application programs and by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This paper presents an efficient approach to verifying higher-degree Galois-field (GF) arithmetic circuits. The proposed method… 
2016
2016
Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the… 
2015
2015
Modern VLSI chips have high complexity and usually contain cryptographic processors to protect their data and external… 
2014
2014
This paper presents a hierarchical formal verification method for cryptographic processors based on a combination of a word-level… 
2009
2009
This paper presents the design of a multiple-valued adder for tamper-resistant cryptographic processors. The proposed adder is… 
2008
2008
In this paper we describe a novel approach for speeding up the computations of characteristic 2 elliptic curve cryptography… 
2006
2006
Biometrics is nowadays one of the most promising techniques in authentication. Biometrics intends to identify a user by his/her… 
Review
2004
Review
2004
IBM has designed special cryptographic processors for its servers for more than 25 years. These began as very simple devices, but… 
2002
2002
Public-key cryptography is fast becoming the foundation for online commerce and other applications that require security and… 
Review
1995
Review
1995
  • L. Hoffman
  • 1995
  • Corpus ID: 5432121
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper…