• Thumbnail for Cryptographic accelerator
    mostly of cryptographic operations, this can greatly increase performance. Intel's AES-NI is by far the most common cryptographic accelerator in commodity...
    2 KB (183 words) - 04:59, 4 October 2024
  • Thumbnail for Hardware acceleration
    a hardware accelerator, though they are usually referred to with a more specific term, such as 3D accelerator, or cryptographic accelerator. Traditionally...
    20 KB (1,789 words) - 05:25, 10 April 2025
  • processing unit Cryptographic accelerator, performs decrypting/encrypting Web accelerator, a proxy server that speeds web-site access Accelerator (Internet...
    5 KB (581 words) - 17:30, 19 December 2024
  • The OpenBSD Cryptographic Framework (OCF) is a service virtualization layer for the uniform management of cryptographic hardware by an operating system...
    7 KB (739 words) - 03:32, 24 December 2024
  • Thumbnail for Hardware-based encryption
    implemented as a coprocessor, in particular a secure cryptoprocessor or cryptographic accelerator, of which an example is the IBM 4758, or its successor, the IBM...
    15 KB (1,245 words) - 03:49, 12 July 2024
  • Thumbnail for TLS acceleration
    Intel in March 2008. Allwinner Technology provides a hardware cryptographic accelerator in its A10, A20, A30 and A80 ARM system-on-chip series, and all...
    3 KB (384 words) - 17:24, 31 March 2025
  • Thumbnail for Silicon Labs
    versions of authenticated firmware that might carry security flaws Cryptographic accelerator Differential Power Analysis (DPA) countermeasures Protected secret...
    35 KB (3,004 words) - 04:28, 5 February 2025
  • A5/1 (redirect from A5 (cryptography))
    a research project to create a massively parallel FPGA-based cryptographic accelerator COPACOBANA. COPACOBANA was the first commercially available solution...
    23 KB (2,725 words) - 00:35, 9 August 2024
  • Thumbnail for Hardware security module
    Hardware security module (category Cryptographic hardware)
    The functions of an HSM are: onboard secure cryptographic key generation, onboard secure cryptographic key storage, at least for the top level and most...
    13 KB (1,539 words) - 16:51, 26 March 2025
  • Internet Key Exchange (category Cryptographic protocols)
    IPsec, IKE daemon via the OpenBSD Cryptographic Framework (OCF), which makes supporting cryptographic accelerators much easier. OCF has recently been...
    20 KB (2,352 words) - 03:42, 2 March 2025
  • programmers. There is also a BluePrints article on using the Cryptographic Accelerator Units on the T1 and T2 processors. A wide range of applications...
    10 KB (1,331 words) - 22:09, 16 April 2025
  • Thumbnail for UltraSPARC T1
    programmers. There is also a BluePrints article on using the Cryptographic Accelerator Units on the T1 and T2 processors. A wide range of applications...
    20 KB (2,691 words) - 22:09, 16 April 2025
  • Thumbnail for MIFARE
    SAM (Secure Access Module) provides the secure storage of cryptographic keys and cryptographic functions. The MIFARE Classic IC is a basic memory storage...
    78 KB (6,975 words) - 02:57, 3 May 2025
  • WolfSSL (category Cryptographic software)
    Standards: PKCS #1 - RSA Cryptography PKCS #3 - Diffie-Hellman Key Agreement PKCS #5 - Password-Based Encryption PKCS #7 - Cryptographic Message Syntax (CMS)...
    20 KB (1,039 words) - 13:26, 3 February 2025
  • Thumbnail for GnuTLS
    GnuTLS (category Cryptographic software)
    authentication X.509 and OpenPGP certificate handling CPU assisted cryptography and cryptographic accelerator support (/dev/crypto), VIA PadLock and AES-NI instruction...
    9 KB (831 words) - 03:08, 18 July 2023
  • Thumbnail for XigmaNAS
    drive and volume management Software RAID Disk encryption (using cryptographic accelerator card if present) Partition MBR, GPT iSCSI initiator Filesystems...
    13 KB (1,099 words) - 23:40, 23 March 2025
  • Thumbnail for Peripheral Component Interconnect
    Fast Ethernet, Bluetooth, modems (often Winmodems), sound cards, cryptographic accelerators, SCSI, IDE–ATA, SATA controllers and combination cards. Mini PCI...
    89 KB (10,827 words) - 00:44, 26 February 2025
  • supporting processors typically installed inside mainframes such as cryptographic accelerators (CryptoExpress), the OSA-Express networking processor, and FICON...
    16 KB (1,805 words) - 13:50, 1 May 2025
  • Comparison of disk encryption software (category Cryptographic software)
    using PBKDF2 or Argon2. Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of. Trusted Platform Module:...
    70 KB (2,834 words) - 03:57, 22 December 2024
  • Ethernet and various other I/O interfaces and accelerators like TCP/IP offloading and a cryptography accelerator with non-volatile storage for crypto keys...
    21 KB (2,424 words) - 22:07, 4 April 2025
  • SHA-2 (category Cryptographic hash functions)
    SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
    51 KB (4,982 words) - 17:12, 16 April 2025
  • Cryptlib (category Cryptographic software)
    make use of the cryptographic capabilities of a variety of external cryptographic devices such as hardware cryptographic accelerators, Fortezza cards...
    14 KB (1,247 words) - 12:17, 31 March 2025
  • Thumbnail for MOSAID
    memory (CAM) for fast routing table lookup, and a multiprocessor cryptographic accelerator developed in partnership with Chrysalis-ITS. The dot-com crash...
    21 KB (1,920 words) - 03:55, 24 October 2024
  • architecture ARM cryptographic extensions are optionally supported on ARM Cortex-A30/50/70 cores Cryptographic hardware accelerators/engines Allwinner...
    26 KB (2,215 words) - 14:42, 13 April 2025
  • In cryptography, Galois/Counter Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance...
    23 KB (3,051 words) - 20:21, 24 March 2025
  • All models except C2x38 support Intel QuickAssist Technology (cryptography accelerator) SoC peripherals include 4 × USB 2.0, 4-6 × SATA (1 for C2308,...
    86 KB (3,203 words) - 09:25, 30 December 2024
  • and his brother Nicko co-founded nCipher to build high speed cryptographic accelerators and hardware security modules, based initially on clusters of...
    10 KB (1,159 words) - 12:37, 30 December 2024
  • memory contents before they are transmitted between servers, using cryptographic accelerators available on all processors with sun4v architecture. All logical...
    15 KB (1,865 words) - 23:27, 28 January 2023
  • functions software developers can call upon for security and cryptography services Coherent Accelerator Processor Interface, a bus technology introduced in IBM's...
    1 KB (159 words) - 15:07, 4 July 2022
  • Thumbnail for Nicko van Someren
    with his brother Alex co-founded nCipher to build high speed cryptographic accelerators and hardware security modules. nCipher went public on the London...
    8 KB (645 words) - 21:17, 21 April 2025