Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,507,380 papers from all fields of science
Search
Sign In
Create Free Account
Secure cryptoprocessor
Known as:
Crypto-processor
, Cryptomicroprocessor
, Cryptoprocessor
A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
Analog hole
Authentication
Booting
Bus encryption
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Protection against key tampering
罗恩·凯达尔
2015
Corpus ID: 67712165
Disclosed is an apparatus and method to protect against key tampering. A computing device may include a cryptoprocessor that is…
Expand
2012
2012
Efficient integrated AES crypto-processor architecture for 8-bit stream cipher
Nabihah Ahmad
,
S. Hasan
2012
Corpus ID: 58103692
Adoption of the Advanced Encryption Standard (AES) as a symmetric encryption algorithm for numerous applications requires a low…
Expand
2010
2010
Hardware Architectures for Elliptic Curve Cryptoprocessors Using Polynomial and Gaussian Normal Basis over GF(2233)
V. Trujillo-Olaya
,
Jaime Velasco-Medina
IFIP International Conference on Theoretical…
2010
Corpus ID: 32013260
This work presents efficient hardware architectures for elliptic curves cryptoprocessors using polynomial and gaussian normal…
Expand
2009
2009
A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms
Abdulhadi Shoufan
,
Thorsten Wink
,
Gregor Molter
,
S. Huss
,
Falko Strentzke
IEEE International Conference on Application…
2009
Corpus ID: 12225853
McEliece scheme represents a code-based public-key cryptosystem. So far, this cryptosystem was not employed because of efficiency…
Expand
2008
2008
Trustworthy Computing under Resource Constraints with the DOWN Policy
M. Ramkumar
IEEE Transactions on Dependable and Secure…
2008
Corpus ID: 2095532
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to…
Expand
Highly Cited
2006
Highly Cited
2006
Designing Resistant Circuits against Malicious Faults Injection Using Asynchronous Logic
Y. Monnet
,
M. Renaudin
,
R. Leveugle
IEEE transactions on computers
2006
Corpus ID: 28003651
This paper presents hardening techniques against fault attacks and the practical evaluation of their efficiency. The circuit…
Expand
2006
2006
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Bishwaranjan Bhattacharjee
,
N. Abe
,
+4 authors
C. Apté
International Workshop on Data Management on New…
2006
Corpus ID: 5840451
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest…
Expand
2005
2005
A clock-less low-voltage AES crypto-processor
G. Bouesse
,
M. Renaudin
,
A. Witon
,
F. Germain
Proceedings of the 31st European Solid-State…
2005
Corpus ID: 30125720
This paper presents a concrete evaluation of quasi delay insensitive (QDI) asynchronous logic in terms of current consumption…
Expand
2003
2003
SystemC design flow for a DES/AES CryptoProcessor
J. Castillo
,
P. Huerta
,
J. Martínez
2003
Corpus ID: 15609748
As the complexity of electronic systems increases every day, new ways for describing these systems also appear. One interesting…
Expand
1998
1998
Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors
Sean W. Smith
,
V. Austel
USENIX Workshop on Electronic Commerce
1998
Corpus ID: 15746664
Secure coprocessors provide a foundation for many exciting electronic commerce applications, as previous work [20, 21] has…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE