AES instruction set

Results: 132



#Item
1Crypto Device Drivers ReleaseJuly 28, 2016  CONTENTS

Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

Add to Reading List

Source URL: fast.dpdk.org

Language: English - Date: 2016-07-28 16:30:34
2Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
3Secure AES Implementation on a 32-bit RISC-V Processor Advisor(s): Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Secure AES Implementation on a 32-bit RISC-V Processor Advisor(s): Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2016-02-24 05:00:01
4International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

Add to Reading List

Source URL: www.tmrfindia.org

Language: English
5Product Brief Intel® Core™ M Processor Razor-Thin Laptops Meets UltraFast Tablets with Intel® Core™ M Processor Platforms Intel’s 14nm process delivers substantial improvements in performance and

Product Brief Intel® Core™ M Processor Razor-Thin Laptops Meets UltraFast Tablets with Intel® Core™ M Processor Platforms Intel’s 14nm process delivers substantial improvements in performance and

Add to Reading List

Source URL: www.intel.ph

Language: English - Date: 2014-09-05 12:11:01
6Product Brief Intel® Core™ M Processor Razor-Thin Laptops Meets UltraFast Tablets with Intel® Core™ M Processor Platforms Intel’s 14nm process delivers substantial improvements in performance and

Product Brief Intel® Core™ M Processor Razor-Thin Laptops Meets UltraFast Tablets with Intel® Core™ M Processor Platforms Intel’s 14nm process delivers substantial improvements in performance and

Add to Reading List

Source URL: www.intel.ie

Language: English - Date: 2014-09-05 11:57:36
7Cloud Data Analytics Gateways

Cloud Data Analytics Gateways

Add to Reading List

Source URL: www.intel.com

Language: English - Date: 2015-04-24 08:19:24
8OpenSSL FIPS Object Module VersionBy the OpenSSL Software Foundation

OpenSSL FIPS Object Module VersionBy the OpenSSL Software Foundation

Add to Reading List

Source URL: openssl.org

Language: English - Date: 2014-06-06 13:16:17
9Symantec PGP Cryptographic Engine FIPSSecurity Policy

Symantec PGP Cryptographic Engine FIPSSecurity Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:19:50
10Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar ∗ Worcester Polytechnic Institute {girazoki,msinci,teisenbarth,sunar}@wpi.edu  Abst

Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar ∗ Worcester Polytechnic Institute {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abst

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-07 18:32:56