• Thumbnail for Secure cryptoprocessor
    A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple...
    18 KB (1,960 words) - 21:52, 28 December 2024
  • Thumbnail for Hardware security module
    network server. A hardware security module contains one or more secure cryptoprocessor chips. HSMs may have features that provide tamper evidence such as...
    13 KB (1,539 words) - 16:46, 12 December 2024
  • Thumbnail for IBM 4758
    The IBM 4758 PCI Cryptographic Coprocessor is a secure cryptoprocessor implemented on a high-security, tamper resistant, programmable PCI expansion card...
    2 KB (187 words) - 19:14, 14 January 2023
  • Thumbnail for Smart card
    such as a One-time password. The One-Time Password is generated by a cryptoprocessor encapsulated in the card. To implement this function, the crypto processor...
    115 KB (12,119 words) - 11:18, 2 January 2025
  • Thumbnail for Software protection dongle
    Thus dongles have become secure cryptoprocessors that execute program instructions that may be input to the cryptoprocessor only in encrypted form. The original...
    9 KB (1,102 words) - 17:21, 5 August 2024
  • Thumbnail for Titan Security Key
    FIDO-compliant security token developed by Google which contains the Titan M cryptoprocessor which is also developed by Google. It was first released on October...
    5 KB (446 words) - 19:54, 2 January 2025
  • Thumbnail for Trusted Platform Module
    A Trusted Platform Module (TPM) is a secure cryptoprocessor that implements the ISO/IEC 11889 standard. Common uses are verifying that the boot process...
    78 KB (6,496 words) - 12:17, 6 January 2025
  • restrictions more difficult. Digital rights management Dongle Secure cryptoprocessor Trust Bruce Schneier (August 2000). "The Fallacy of Trusted Client...
    3 KB (320 words) - 14:03, 21 November 2024
  • Thumbnail for Cryptography
    computational problems Pre-shared key – Method to set encryption keys Secure cryptoprocessor Strong cryptography – Term applied to cryptographic systems that are...
    99 KB (10,939 words) - 15:19, 6 January 2025
  • in RNA-Seq. Trusted Platform Module, a specification for a secure cryptoprocessor included with some computers Tivoli Provisioning Manager, a software...
    2 KB (220 words) - 11:53, 5 March 2024
  • would have been twenty years before. Bullrun (decryption program) Cryptoprocessor Crypto: How the Code Rebels Beat the Government—Saving Privacy in the...
    18 KB (1,893 words) - 07:06, 16 October 2024
  • Physics processing unit (PPU) Digital signal processor (DSP) Tensor Processing Unit (TPU) Secure cryptoprocessor Network processor Baseband processor...
    96 KB (13,298 words) - 19:32, 31 October 2024
  • Thumbnail for Identity document forgery
    hidden security devices can also be added, including embedded secure cryptoprocessor chips which are designed to be very difficult to forge, and RFID tags⁠ ⁠—⁠ ⁠the...
    11 KB (1,495 words) - 14:38, 2 January 2025
  • Physics processing unit (PPU) Digital signal processor (DSP) Tensor Processing Unit (TPU) Secure cryptoprocessor Network processor Baseband processor...
    17 KB (2,288 words) - 01:44, 18 November 2024
  • Environmental design (esp. CPTED) Mantrap Physical security Secrecy Secure cryptoprocessor Security through obscurity Misc. Topics Full disclosure (computer security)...
    13 KB (1,196 words) - 20:09, 21 December 2024
  • network machine learning, using Google's own TensorFlow software. Secure cryptoprocessor Quantum processor, a computer that takes advantage of quantum mechanical...
    4 KB (456 words) - 21:54, 25 December 2024
  • system does not have a Trusted Platform Module (TPM) 2.0 compliant cryptoprocessor and UEFI secure boot enabled, as mandated by Microsoft's minimum system...
    50 KB (5,388 words) - 03:46, 4 January 2025
  • specialized cybersecurity hardware. Hardware security module Secure cryptoprocessor Trusted Platform Module Unified Extensible Firmware Interface § Secure...
    19 KB (1,781 words) - 14:01, 4 September 2024
  • Security Act Fair use High-bandwidth Digital Content Protection Secure cryptoprocessor Trusted Computing Trusted Platform Module Haber, Stuart (2003). "If...
    7 KB (867 words) - 14:25, 7 May 2024
  • Thumbnail for ATM
    calculator keypad), manufactured as part of a secure enclosure Secure cryptoprocessor, generally within a secure enclosure Display (used by the customer...
    110 KB (11,115 words) - 12:45, 1 January 2025
  • Physics processing unit (PPU) Digital signal processor (DSP) Tensor Processing Unit (TPU) Secure cryptoprocessor Network processor Baseband processor...
    23 KB (2,885 words) - 01:06, 1 December 2024
  • trojan. Often, they are used to undermine security in smartcards and cryptoprocessors, unless investment is made in anti-backdoor design methods. They have...
    15 KB (1,547 words) - 07:10, 23 December 2024
  • modification timestamps or sizes. Trusted Platform Module (TPM) is a secure cryptoprocessor embedded in the motherboard that can be used to authenticate a hardware...
    17 KB (2,194 words) - 03:24, 4 September 2024
  • a security system with tamper-resistant properties (e.g. a secure cryptoprocessor, secure file system, human-readable features) and is capable of providing...
    22 KB (2,500 words) - 15:25, 30 July 2024
  • between two IP hosts is established. If a host or gateway has a separate cryptoprocessor, which is common in the military and can also be found in commercial...
    45 KB (5,313 words) - 03:07, 3 December 2024
  • BitLocker can work in conjunction with a Trusted Platform Module (TPM) cryptoprocessor (version 1.2) embedded in a computer's motherboard, or with a USB key...
    172 KB (16,858 words) - 18:40, 4 December 2024
  • subscribers' receivers using a combination of a physically distributed secure cryptoprocessor in the form of a smartcard and encrypted over-the-air messages. Richard...
    2 KB (275 words) - 15:45, 13 August 2022
  • Thumbnail for Apple T2
    processors designed by Apple for their products Apple A10 bridgeOS Secure cryptoprocessor Boldt, Paul (July 11, 2021). "Apple's Orphan Silicon". SemiWiki. Archived...
    25 KB (2,112 words) - 19:15, 2 September 2024
  • Physics processing unit (PPU) Digital signal processor (DSP) Tensor Processing Unit (TPU) Secure cryptoprocessor Network processor Baseband processor...
    24 KB (3,329 words) - 22:40, 1 December 2024
  • The IBM 4764 Cryptographic Coprocessor is a secure cryptoprocessor that performs cryptographic operations used by application programs and by communications...
    3 KB (290 words) - 20:12, 25 August 2024