Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,708,354 papers from all fields of science
Search
Sign In
Create Free Account
IBM 4764
The IBM 4764 Cryptographic Coprocessor is a secure cryptoprocessor that performs cryptographic operations used by application programs and by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Algorithm
Cryptographic hash function
FIPS 140-2
IBM 4758
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Formal Approach for Verifying Galois Field Arithmetic Circuits of Higher Degrees
Rei Ueno
,
N. Homma
,
Yukihiro Sugawara
,
T. Aoki
IEEE transactions on computers
2017
Corpus ID: 13453245
This paper presents an efficient approach to verifying higher-degree Galois-field (GF) arithmetic circuits. The proposed method…
Expand
2016
2016
Hardware attacks: an algebraic approach
Samer Moein
,
F. Gebali
,
T. Gulliver
Journal of Cryptographic Engineering
2016
Corpus ID: 19662793
Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the…
Expand
2015
2015
Hardware attack risk assessment
Samer Moein
,
F. Gebali
,
T. Gulliver
,
M. El-Kharashi
International Conference on Communication and…
2015
Corpus ID: 2814648
Modern VLSI chips have high complexity and usually contain cryptographic processors to protect their data and external…
Expand
2011
2011
Design of CMOS constant switching current flip-flop
Myunghee Lee
2011
Corpus ID: 61030035
A novel flip-flop that has constant switching current profile is proposed. The proposed flip-flop contributes no pattern…
Expand
2009
2009
Multiple-Valued Constant-Power Adder for Cryptographic Processors
Yuichi Baba
,
A. Miyamoto
,
N. Homma
,
T. Aoki
IEEE International Symposium on Multiple-Valued…
2009
Corpus ID: 6448015
This paper presents the design of a multiple-valued adder for tamper-resistant cryptographic processors. The proposed adder is…
Expand
2008
2008
A Technique for Accelerating Characteristic 2 Elliptic Curve Cryptography
S. Gueron
,
M. Kounavis
International Conference on Information…
2008
Corpus ID: 14626560
In this paper we describe a novel approach for speeding up the computations of characteristic 2 elliptic curve cryptography…
Expand
2006
2006
FPGA implementation for an iris biometric processor
J. Liu-Jimenez
,
R. Sánchez-Reillo
,
A. Lindoso
,
O. Miguel-Hurtado
IEEE International Conference on Field…
2006
Corpus ID: 34510702
Biometrics is nowadays one of the most promising techniques in authentication. Biometrics intends to identify a user by his/her…
Expand
Review
2005
Review
2005
Number 641 Computer Laboratory UCAM-CL-TR-641 ISSN 1476-2986 Cryptographic processors – a survey
Ross J. Anderson
,
M. Bond
,
Jolyon Clulow
,
S. Skorobogatov
2005
Corpus ID: 42033
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their history began with…
Expand
Review
2004
Review
2004
The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer
T. W. Arnold
,
L. V. Doorn
IBM Journal of Research and Development
2004
Corpus ID: 16108372
IBM has designed special cryptographic processors for its servers for more than 25 years. These began as very simple devices, but…
Expand
Review
1995
Review
1995
Building in Big Brother
L. Hoffman
Springer: New York
1995
Corpus ID: 5432121
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE