AES instruction set

Results: 132



#Item
1Computing / Cryptography / Computer architecture / Advanced Encryption Standard / Cryptographic software / Data Plane Development Kit / Networking hardware / Cryptographic protocols / Internet protocols / AES instruction set / IPsec

Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

Add to Reading List

Source URL: fast.dpdk.org

Language: English - Date: 2016-07-28 16:30:34
2Cryptography / Advanced Encryption Standard / X86 instructions / Rambus / Side-channel attack / AES instruction set / Cryptography Research / Masking / Technology / Computing

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
3Instruction set architectures / Reduced instruction set computing / RISC-V / Instruction set / ARM architecture / Comparison of instruction set architectures

Secure AES Implementation on a 32-bit RISC-V Processor Advisor(s): Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2016-02-24 05:00:01
4Advanced Encryption Standard / Cryptographic software / Block cipher modes of operation / AES instruction set / Crypto++ / LEX / Symmetric-key algorithm / Block cipher / IPsec / AES implementations / Galois/Counter Mode

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

Add to Reading List

Source URL: www.tmrfindia.org

Language: English
5Out-of-band management / Computing / Intel Active Management Technology / Intel / Hyper-threading / AES instruction set / Centrino / Intel vPro / X86 architecture / Computer architecture / Computer hardware

Product Brief Intel® Core™ M Processor Razor-Thin Laptops Meets UltraFast Tablets with Intel® Core™ M Processor Platforms Intel’s 14nm process delivers substantial improvements in performance and

Add to Reading List

Source URL: www.intel.ph

Language: English - Date: 2014-09-05 12:11:01
6Out-of-band management / Computing / Intel Active Management Technology / Intel / Hyper-threading / AES instruction set / Centrino / Intel vPro / X86 architecture / Computer architecture / Computer hardware

Product Brief Intel® Core™ M Processor Razor-Thin Laptops Meets UltraFast Tablets with Intel® Core™ M Processor Platforms Intel’s 14nm process delivers substantial improvements in performance and

Add to Reading List

Source URL: www.intel.ie

Language: English - Date: 2014-09-05 11:57:36
7X86 architecture / Smartphones / Ambient intelligence / Internet of Things / Intel / McAfee / X86 virtualization / Cloud computing / AES instruction set / System software / Computing / Software

Cloud Data Analytics Gateways

Add to Reading List

Source URL: www.intel.com

Language: English - Date: 2015-04-24 08:19:24
8X86 architecture / Cryptographic software / AES instruction set / Advanced Encryption Standard / OpenSSL / X86-64 / X86 / Itanium / Xeon / Computer architecture / Computing / Instruction set architectures

OpenSSL FIPS Object Module VersionBy the OpenSSL Software Foundation

Add to Reading List

Source URL: openssl.org

Language: English - Date: 2014-06-06 13:16:17
9Advanced Encryption Standard / AES instruction set / X86 architecture / FIPS 140-2 / Cryptographic hash function / FIPS 140 / Key Wrap / Crypto++ / Pretty Good Privacy / Cryptography / Cryptography standards / Cryptographic software

Symantec PGP Cryptographic Engine FIPSSecurity Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:19:50
10Advanced Encryption Standard / Central processing unit / Computer memory / Virtual machines / CPU cache / Hyper-V / Timing attack / AES instruction set / Xen / System software / Software / Computing

Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar ∗ Worcester Polytechnic Institute {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abst

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-07 18:32:56
UPDATE