SSL acceleration

Known as: Hardware crypto accelerator, SSL accelerator, SSL accelerators 
SSL acceleration is a method of offloading processor-intensive public-key encryption for Transport Layer Security (TLS) and its predecessor Secure… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2002-2018
024620022018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
As a countermeasure against the famous Bleichenbacher attack on RSA based ciphersuites, all TLS RFCs starting from RFC 2246 (TLS… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Secure end-to-end communication is becoming increasingly important as more private and sensitive data is transferred on the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2010
2010
The power of side-channel leakage attacks on cryptographic implementations is evident. Today’s practical defenses are typically… (More)
  • figure 1
  • figure 2
  • table 3
  • table 1
Is this relevant?
2010
2010
The power of side-channel leakage attacks on cryptographic implementations is evident. Today’s practical defenses are typically… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2010
2010
Business-to-Business and Business-to-Customer transactions in Internet require secure communication, especially for web… (More)
  • figure 3
Is this relevant?
2010
2010
This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
Business-to-business (B2B) and Business-to-consumer (B2C) transactions in public domains such as Internet require secure… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
IPSec is a suite of protocols that adds security to communications at the IP level. This suite of protocols is becoming more and… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We present template attacks, the strongest form of side channel attack possible in an information theoretic sense. These attacks… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2002
2002
We describe a clustered SSL accelerator. Although current SSL acceleration solutions [1, 2] often employ multiple nodes in… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?