Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,984,623 papers from all fields of science
Search
Sign In
Create Free Account
Secure cryptoprocessor
Known as:
Crypto-processor
, Cryptomicroprocessor
, Cryptoprocessor
A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
Analog hole
Authentication
Booting
Bus encryption
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Protection against key tampering
罗恩·凯达尔
2015
Corpus ID: 67712165
Disclosed is an apparatus and method to protect against key tampering. A computing device may include a cryptoprocessor that is…
Expand
2011
2011
Optimized Reversible Montgomery Multiplier
R. S. B
,
Umarani T G
,
Shreedhar H K
2011
Corpus ID: 16020052
Reversible computation is of the growing interests to power minimization which has applications in low power CMOS design, quantum…
Expand
2010
2010
Hardware Architectures for Elliptic Curve Cryptoprocessors Using Polynomial and Gaussian Normal Basis over GF(2233)
V. Trujillo-Olaya
,
Jaime Velasco-Medina
IFIP International Conference on Theoretical…
2010
Corpus ID: 32013260
This work presents efficient hardware architectures for elliptic curves cryptoprocessors using polynomial and gaussian normal…
Expand
2008
2008
Trustworthy Computing under Resource Constraints with the DOWN Policy
M. Ramkumar
IEEE Transactions on Dependable and Secure…
2008
Corpus ID: 2095532
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to…
Expand
Highly Cited
2006
Highly Cited
2006
Designing Resistant Circuits against Malicious Faults Injection Using Asynchronous Logic
Y. Monnet
,
M. Renaudin
,
R. Leveugle
IEEE transactions on computers
2006
Corpus ID: 28003651
This paper presents hardening techniques against fault attacks and the practical evaluation of their efficiency. The circuit…
Expand
2006
2006
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Bishwaranjan Bhattacharjee
,
N. Abe
,
+4 authors
C. Apté
International Workshop on Data Management on New…
2006
Corpus ID: 5840451
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest…
Expand
2005
2005
A clock-less low-voltage AES crypto-processor
G. Bouesse
,
M. Renaudin
,
A. Witon
,
F. Germain
Proceedings of the 31st European Solid-State…
2005
Corpus ID: 30125720
This paper presents a concrete evaluation of quasi delay insensitive (QDI) asynchronous logic in terms of current consumption…
Expand
2003
2003
SystemC design flow for a DES/AES CryptoProcessor
J. Castillo
,
P. Huerta
,
J. Martínez
2003
Corpus ID: 15609748
As the complexity of electronic systems increases every day, new ways for describing these systems also appear. One interesting…
Expand
2002
2002
Programming Satan's Agents
Volker Roth
SEMAS
2002
Corpus ID: 7224896
Highly Cited
2001
Highly Cited
2001
Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm
T. Kwon
,
C. You
,
Won-Seok Heo
,
Yong-Kyu Kang
,
J. Choi
ISCAS . The IEEE International Symposium on…
2001
Corpus ID: 12620259
In this paper, two implementation methods to optimize a 1024-bit RSA processor are presented. The Montgomery algorithm is used…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE