Secure cryptoprocessor

Results: 19



#Item
11Computer architecture / Secure cryptoprocessor / CPU cache / Memory management unit / Software protection dongle / Bus encryption / X86 memory segmentation / Interrupt handler / Memory protection / Computer hardware / Computing / Cryptography

The TrustNo 1 Cryptoprocessor Concept Markus Kuhn — [removed] — [removed]Abstract: Cryptoprocessors feature an on-chip block cipher hardware between the cache and the bus interface. Code and data are decry

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-06 07:11:39
12Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]Low Cost Attacks on Tamper Resistant Devices Ross

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
13Ubiquitous computing / Computer network security / Technology / Smart card / Cyberwarfare / Computer security / Public-key cryptography / Cryptosystem / Secure cryptoprocessor / Cryptography / Security / ISO standards

A304-medea+ (LO2[removed]:05

Add to Reading List

Source URL: www.catrene.org

Language: English - Date: 2009-03-25 10:36:32
14Information / FIPS 140-2 / IBM / Device driver / FIPS 140 / Smart card / Operating system / Communications protocol / Secure cryptoprocessor / Cryptography standards / Computing / Espionage

IBM 4758 Model 23 Security Policy Secure Systems and Smart Cards Group IBM T.J. Watson Research Center June 15, [removed]Scope of Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
15Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
16Cryptography / Microprocessors / Computer network security / Intel / Computer security / Secure cryptoprocessor / Tamper resistance / Trusted Computing / Computer hardware / Electronic engineering / Computing

Cyber-Rights & Cyber-Liberties (UK) Control of Processor Security Features Could New Chip Privacy and Security Measures Tie Users’ Hands? A New Report By Cyber-Rights & Cyber-Liberties (UK), June 1999

Add to Reading List

Source URL: www.cyber-rights.org

Language: English - Date: 1999-07-06 10:49:28
17Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
18Packaging / Security / Tamper resistance / Secure cryptoprocessor / Hardware security module / ISO standards / Ubiquitous computing / Power analysis / Smart card / Cryptography / Espionage / Technology

Technical Report UCAM-CL-TR-641

Add to Reading List

Source URL: crysys.hu

Language: English - Date: 2007-07-03 06:15:02
19Tamper resistance / Hardware security module / Secure cryptoprocessor / Smart card / Power analysis / SecurID / Trusted Platform Module / Public-key cryptography / IBM / Cryptography / Espionage / Technology

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-04-08 09:15:29
UPDATE