Skip to search formSkip to main contentSkip to account menu

IBM 4764

The IBM 4764 Cryptographic Coprocessor is a secure cryptoprocessor that performs cryptographic operations used by application programs and by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This paper presents an efficient approach to verifying higher-degree Galois-field (GF) arithmetic circuits. The proposed method… 
2016
2016
Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the… 
2014
2014
In this paper, we propose an efficient 256×256 bit modular multiplier based on Montgomery reduction algorithm. The 256 × 256 bit… 
2009
2009
This paper presents the design of a multiple-valued adder for tamper-resistant cryptographic processors. The proposed adder is… 
2007
2007
IBM has offered hardware-based cryptographic processors for its mainframe computers for nearly thirty years. Over that period… 
Review
2006
Review
2006
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their origins lie with… 
2006
2006
Biometrics is nowadays one of the most promising techniques in authentication. Biometrics intends to identify a user by his/her… 
Highly Cited
2006
Highly Cited
2006
Secure communication over public networks like the Internet requires the use of cryptographic algorithms as basic building blocks… 
Review
2004
Review
2004
IBM has designed special cryptographic processors for its servers for more than 25 years. These began as very simple devices, but… 
2000
2000
This talk follows on more from the talks by Larry Paulson and Giampaolo Bella that we had earlier. The problem I’m going to…