Skip to search form
Skip to main content
>
Semantic Scholar
Semantic Scholar's Logo
Search
Sign In
Create Free Account
You are currently offline. Some features of the site may not work correctly.
IBM 4764
The IBM 4764 Cryptographic Coprocessor is a secure cryptoprocessor that performs cryptographic operations used by application programs and by…
Expand
Wikipedia
Create Alert
Related topics
Related topics
12 relations
Algorithm
Cryptographic hash function
FIPS 140-2
IBM 4758
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Formal Approach for Verifying Galois Field Arithmetic Circuits of Higher Degrees
Rei Ueno
,
N. Homma
,
Yukihiro Sugawara
,
T. Aoki
IEEE Transactions on Computers
2017
Corpus ID: 13453245
This paper presents an efficient approach to verifying higher-degree Galois-field (GF) arithmetic circuits. The proposed method…
Expand
2016
2016
Attack sensing against EM leakage and injection
N. Miura
,
S. Bhasin
International SoC Design Conference (ISOCC)
2016
Corpus ID: 12811944
This paper introduces two circuit-level reactive sensor-based countermeasures against malicious implementation attacks exploiting…
Expand
2014
2014
Efficient montgomery multiplier for pairing and elliptic curve based cryptography
K. Javeed
,
X. Wang
9th International Symposium on Communication…
2014
Corpus ID: 8246795
In this paper, we propose an efficient 256×256 bit modular multiplier based on Montgomery reduction algorithm. The 256 × 256 bit…
Expand
2011
2011
Design of CMOS constant switching current flip-flop
M. Lee
2011
Corpus ID: 61030035
A novel flip-flop that has constant switching current profile is proposed. The proposed flip-flop contributes no pattern…
Expand
2009
2009
Multiple-Valued Constant-Power Adder for Cryptographic Processors
Y. Baba
,
A. Miyamoto
,
N. Homma
,
T. Aoki
39th International Symposium on Multiple-Valued…
2009
Corpus ID: 6448015
This paper presents the design of a multiple-valued adder for tamper-resistant cryptographic processors. The proposed adder is…
Expand
2008
2008
A Technique for Accelerating Characteristic 2 Elliptic Curve Cryptography
Shay Gueron
,
Michael E. Kounavis
Fifth International Conference on Information…
2008
Corpus ID: 14626560
In this paper we describe a novel approach for speeding up the computations of characteristic 2 elliptic curve cryptography…
Expand
2007
2007
Cryptographic system enhancements for the IBM System z9
T. Arnold
,
Anne Dames
,
M. Hocker
,
Mark D. Marik
,
Nancy A. Pellicciotti
,
K. Werner
IBM J. Res. Dev.
2007
Corpus ID: 8408349
IBM has offered hardware-based cryptographic processors for its mainframe computers for nearly thirty years. Over that period…
Expand
2006
2006
FPGA implementation for an iris biometric processor
J. Liu-Jimenez
,
R. Sánchez-Reillo
,
A. Lindoso
,
O. Miguel-Hurtado
IEEE International Conference on Field…
2006
Corpus ID: 34510702
Biometrics is nowadays one of the most promising techniques in authentication. Biometrics intends to identify a user by his/her…
Expand
Highly Cited
2006
Highly Cited
2006
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors
Stefan Tillich
,
Johann Großschädl
CHES
2006
Corpus ID: 14079676
Secure communication over public networks like the Internet requires the use of cryptographic algorithms as basic building blocks…
Expand
2000
2000
The Correctness of Crypto Transaction Sets
R. Anderson
Security Protocols Workshop
2000
Corpus ID: 20229721
This talk follows on more from the talks by Larry Paulson and Giampaolo Bella that we had earlier. The problem I’m going to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE