Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

IBM 4764

The IBM 4764 Cryptographic Coprocessor is a secure cryptoprocessor that performs cryptographic operations used by application programs and by… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This paper presents an efficient approach to verifying higher-degree Galois-field (GF) arithmetic circuits. The proposed method… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
2016
2016
  • N. Miura, S. Bhasin
  • International SoC Design Conference (ISOCC)
  • 2016
  • Corpus ID: 12811944
This paper introduces two circuit-level reactive sensor-based countermeasures against malicious implementation attacks exploiting… Expand
2014
2014
  • K. Javeed, X. Wang
  • 9th International Symposium on Communication…
  • 2014
  • Corpus ID: 8246795
In this paper, we propose an efficient 256×256 bit modular multiplier based on Montgomery reduction algorithm. The 256 × 256 bit… Expand
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 3
2011
2011
A novel flip-flop that has constant switching current profile is proposed. The proposed flip-flop contributes no pattern… Expand
2009
2009
This paper presents the design of a multiple-valued adder for tamper-resistant cryptographic processors. The proposed adder is… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2008
2008
In this paper we describe a novel approach for speeding up the computations of characteristic 2 elliptic curve cryptography… Expand
  • figure 1
  • figure 2
  • table 1
2007
2007
IBM has offered hardware-based cryptographic processors for its mainframe computers for nearly thirty years. Over that period… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
2006
2006
Biometrics is nowadays one of the most promising techniques in authentication. Biometrics intends to identify a user by his/her… Expand
  • figure 1
  • figure 3
  • figure 2
  • table 1
  • table 2
Highly Cited
2006
Highly Cited
2006
Secure communication over public networks like the Internet requires the use of cryptographic algorithms as basic building blocks… Expand
  • figure 2
  • figure 4
  • figure 5
  • table 1
  • table 2
2000
2000
  • R. Anderson
  • Security Protocols Workshop
  • 2000
  • Corpus ID: 20229721
This talk follows on more from the talks by Larry Paulson and Giampaolo Bella that we had earlier. The problem I’m going to… Expand
  • figure 1
  • figure 2