mostly of cryptographic operations, this can greatly increase performance. Intel's AES-NI is by far the most common cryptographic accelerator in commodity...
2 KB (183 words) - 04:59, 4 October 2024
Hardware acceleration (redirect from Hardware accelerator)
a hardware accelerator, though they are usually referred to with a more specific term, such as 3D accelerator, or cryptographic accelerator. Traditionally...
20 KB (1,789 words) - 05:25, 10 April 2025
processing unit Cryptographic accelerator, performs decrypting/encrypting Web accelerator, a proxy server that speeds web-site access Accelerator (Internet...
5 KB (581 words) - 17:30, 19 December 2024
The OpenBSD Cryptographic Framework (OCF) is a service virtualization layer for the uniform management of cryptographic hardware by an operating system...
7 KB (739 words) - 03:32, 24 December 2024
Hardware-based encryption (redirect from Hardware-based cryptography)
implemented as a coprocessor, in particular a secure cryptoprocessor or cryptographic accelerator, of which an example is the IBM 4758, or its successor, the IBM...
15 KB (1,245 words) - 03:49, 12 July 2024
TLS acceleration (redirect from SSL accelerator)
Intel in March 2008. Allwinner Technology provides a hardware cryptographic accelerator in its A10, A20, A30 and A80 ARM system-on-chip series, and all...
3 KB (384 words) - 17:24, 31 March 2025
versions of authenticated firmware that might carry security flaws Cryptographic accelerator Differential Power Analysis (DPA) countermeasures Protected secret...
35 KB (3,004 words) - 04:28, 5 February 2025
A5/1 (redirect from A5 (cryptography))
a research project to create a massively parallel FPGA-based cryptographic accelerator COPACOBANA. COPACOBANA was the first commercially available solution...
23 KB (2,725 words) - 00:35, 9 August 2024
Hardware security module (category Cryptographic hardware)
The functions of an HSM are: onboard secure cryptographic key generation, onboard secure cryptographic key storage, at least for the top level and most...
13 KB (1,539 words) - 16:51, 26 March 2025
Internet Key Exchange (category Cryptographic protocols)
IPsec, IKE daemon via the OpenBSD Cryptographic Framework (OCF), which makes supporting cryptographic accelerators much easier. OCF has recently been...
20 KB (2,352 words) - 03:42, 2 March 2025
programmers. There is also a BluePrints article on using the Cryptographic Accelerator Units on the T1 and T2 processors. A wide range of applications...
10 KB (1,331 words) - 22:09, 16 April 2025
programmers. There is also a BluePrints article on using the Cryptographic Accelerator Units on the T1 and T2 processors. A wide range of applications...
20 KB (2,691 words) - 22:09, 16 April 2025
SAM (Secure Access Module) provides the secure storage of cryptographic keys and cryptographic functions. The MIFARE Classic IC is a basic memory storage...
78 KB (6,975 words) - 02:57, 3 May 2025
WolfSSL (category Cryptographic software)
Standards: PKCS #1 - RSA Cryptography PKCS #3 - Diffie-Hellman Key Agreement PKCS #5 - Password-Based Encryption PKCS #7 - Cryptographic Message Syntax (CMS)...
20 KB (1,039 words) - 13:26, 3 February 2025
GnuTLS (category Cryptographic software)
authentication X.509 and OpenPGP certificate handling CPU assisted cryptography and cryptographic accelerator support (/dev/crypto), VIA PadLock and AES-NI instruction...
9 KB (831 words) - 03:08, 18 July 2023
drive and volume management Software RAID Disk encryption (using cryptographic accelerator card if present) Partition MBR, GPT iSCSI initiator Filesystems...
13 KB (1,099 words) - 23:40, 23 March 2025
Fast Ethernet, Bluetooth, modems (often Winmodems), sound cards, cryptographic accelerators, SCSI, IDE–ATA, SATA controllers and combination cards. Mini PCI...
89 KB (10,827 words) - 00:44, 26 February 2025
supporting processors typically installed inside mainframes such as cryptographic accelerators (CryptoExpress), the OSA-Express networking processor, and FICON...
16 KB (1,805 words) - 13:50, 1 May 2025
Comparison of disk encryption software (category Cryptographic software)
using PBKDF2 or Argon2. Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of. Trusted Platform Module:...
70 KB (2,834 words) - 03:57, 22 December 2024
Ethernet and various other I/O interfaces and accelerators like TCP/IP offloading and a cryptography accelerator with non-volatile storage for crypto keys...
21 KB (2,424 words) - 22:07, 4 April 2025
SHA-2 (category Cryptographic hash functions)
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
51 KB (4,982 words) - 17:12, 16 April 2025
Cryptlib (category Cryptographic software)
make use of the cryptographic capabilities of a variety of external cryptographic devices such as hardware cryptographic accelerators, Fortezza cards...
14 KB (1,247 words) - 12:17, 31 March 2025
memory (CAM) for fast routing table lookup, and a multiprocessor cryptographic accelerator developed in partnership with Chrysalis-ITS. The dot-com crash...
21 KB (1,920 words) - 03:55, 24 October 2024
architecture ARM cryptographic extensions are optionally supported on ARM Cortex-A30/50/70 cores Cryptographic hardware accelerators/engines Allwinner...
26 KB (2,215 words) - 14:42, 13 April 2025
In cryptography, Galois/Counter Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance...
23 KB (3,051 words) - 20:21, 24 March 2025
All models except C2x38 support Intel QuickAssist Technology (cryptography accelerator) SoC peripherals include 4 × USB 2.0, 4-6 × SATA (1 for C2308,...
86 KB (3,203 words) - 09:25, 30 December 2024
and his brother Nicko co-founded nCipher to build high speed cryptographic accelerators and hardware security modules, based initially on clusters of...
10 KB (1,159 words) - 12:37, 30 December 2024
memory contents before they are transmitted between servers, using cryptographic accelerators available on all processors with sun4v architecture. All logical...
15 KB (1,865 words) - 23:27, 28 January 2023
functions software developers can call upon for security and cryptography services Coherent Accelerator Processor Interface, a bus technology introduced in IBM's...
1 KB (159 words) - 15:07, 4 July 2022
with his brother Alex co-founded nCipher to build high speed cryptographic accelerators and hardware security modules. nCipher went public on the London...
8 KB (645 words) - 21:17, 21 April 2025