Secure cryptoprocessor

Known as: Crypto-processor, Cryptomicroprocessor, Cryptoprocessor 
A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1983-2017
05101519832017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
  • Rajitha Natti
  • 2017
One among the several challenges in the area of applied cryptography is not just devising a secure cryptographic algorithm but… (More)
  • figure 1
  • figure 2
  • table 1
  • table 3
  • table 2
Is this relevant?
Highly Cited
2014
Highly Cited
2014
In this paper we propose an efficient and compact processor for a ring-LWE based encryption scheme. We present three… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2011
2011
This paper presents an efficient architecture for computing cryptographic ηT pairing for providing 128-bit security. A… (More)
Is this relevant?
2010
2010
The McEliece public-key cryptosystem relies on the NP-hard decoding problem, and therefore, is regarded as a solution for… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2007
2007
This paper presents a reconfigurable curve-based cryptoprocessor that accelerates scalar multiplication of Elliptic Curve… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Enterprise firewalls can be easily circumvented, e.g. by attack agents aboard infected mobile computers or telecommuters… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2001
2001
Too often, “security of Web transactions” reduces to “encryption of the channel”—and neglects to address what happens at the… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Attacks are presented on the IBM 4758 CCA (the first ever security module to have achieved all round FIPS140-1 Level 4… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can execute (and… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
1997
1997
Cryptoprocessors feature an on-chip block cipher hardware between the cache and the bus interface. Code and data are decrypted on… (More)
Is this relevant?