Skip to search formSkip to main contentSkip to account menu

IBM 4764

The IBM 4764 Cryptographic Coprocessor is a secure cryptoprocessor that performs cryptographic operations used by application programs and by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This paper presents an efficient approach to verifying higher-degree Galois-field (GF) arithmetic circuits. The proposed method… 
2016
2016
Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the… 
2015
2015
Modern VLSI chips have high complexity and usually contain cryptographic processors to protect their data and external… 
2011
2011
A novel flip-flop that has constant switching current profile is proposed. The proposed flip-flop contributes no pattern… 
2009
2009
This paper presents the design of a multiple-valued adder for tamper-resistant cryptographic processors. The proposed adder is… 
2008
2008
In this paper we describe a novel approach for speeding up the computations of characteristic 2 elliptic curve cryptography… 
2006
2006
Biometrics is nowadays one of the most promising techniques in authentication. Biometrics intends to identify a user by his/her… 
Review
2005
Review
2005
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their history began with… 
Review
2004
Review
2004
IBM has designed special cryptographic processors for its servers for more than 25 years. These began as very simple devices, but… 
Review
1995
Review
1995
  • L. Hoffman
  • 1995
  • Corpus ID: 5432121
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper…