IBM 4764

The IBM 4764 Cryptographic Coprocessor is a secure cryptoprocessor that performs cryptographic operations used by application programs and by… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This paper presents an efficient approach to verifying higher-degree Galois-field (GF) arithmetic circuits. The proposed method… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2014
2014
This paper presents radix-4 and radix-8 Booth encoded modular multipliers over general Fp based on inter-leaved multiplication… (More)
  • table I
  • figure 1
  • figure 3
  • table II
  • figure 4
Is this relevant?
2014
2014
This paper presents a formal method for designing cryptographic processor datapaths on the basis of arithmetic circuits over… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2010
2010
Storage is increasingly becoming a vector for data compromise. Solutions for protecting on-disk data confidentiality and… (More)
Is this relevant?
2009
2009
This paper presents the design of a multiple-valued adder for tamper-resistant cryptographic processors. The proposed adder is… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
In this paper we describe a novel approach for speeding up the computations of characteristic 2 elliptic curve cryptography… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2007
2007
Attacks based on a differential power analysis (DPA) are a main threat when designing cryptographic functions for implementation… (More)
  • table 1
  • table 2
  • figure 1
  • figure 3
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Secure communication over public networks like the Internet requires the use of cryptographic algorithms as basic building blocks… (More)
  • figure 2
  • figure 4
  • figure 5
  • table 1
  • table 2
Is this relevant?
2006
2006
Biometrics is nowadays one of the most promising techniques in authentication. Biometrics intends to identify a user by his/her… (More)
  • figure 1
  • figure 3
  • figure 2
  • table 1
  • table 2
Is this relevant?
1994
1994
  • Matt Blaze
  • ACM Conference on Computer and Communications…
  • 1994
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as “Clipper… (More)
Is this relevant?