Searched full:cryptography (Results 1 – 25 of 51) sorted by relevance
123
279 The standard Zbkb bitmanip instructions for cryptography as ratified280 in version 1.0 of RISC-V Cryptography Extensions Volume I286 in version 1.0 of RISC-V Cryptography Extensions Volume I292 in version 1.0 of RISC-V Cryptography Extensions Volume I371 The standard Zk Standard Scalar cryptography extension as ratified372 in version 1.0 of RISC-V Cryptography Extensions Volume I378 version 1.0 of RISC-V Cryptography Extensions Volume I384 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I390 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I396 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I[all …]
128 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.131 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.134 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.137 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.140 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.143 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.146 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.149 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.152 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.155 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.
119 …"PublicDescription": "This counter counts the total number of the elliptic-curve cryptography (ECC…126 …cycles when the ECC coprocessor is busy performing the elliptic-curve cryptography (ECC) functions…133 …"PublicDescription": "This counter counts the total number of the elliptic-curve cryptography (ECC…140 … counts the total number of CPU cycles blocked for the elliptic-curve cryptography (ECC) functions…
15 Cryptography (ECC) device provides hardware acceleration for elliptic curve16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
289 cryptography293 cryptography296 number of TX and RX sessions opened with host cryptography299 number of TX and RX sessions opened with NIC cryptography305 number of RX resyncs sent to NICs handling cryptography
150 Build support for MACsec cryptography-offload acceleration in the NIC.158 Build support for IPsec cryptography-offload acceleration in the NIC.166 Build support for TLS cryptography-offload acceleration in the NIC.
67 | Enables :ref:`IPSec XFRM cryptography-offload acceleration <xfrm_device>`.72 | Build support for MACsec cryptography-offload acceleration in the NIC.83 | TLS cryptography-offload acceleration.
4 Asymmetric / Public-key Cryptography Key Type22 public-key cryptography, without imposing any particular restrictions on the23 form or mechanism of the cryptography or form of the key.92 Three enums are defined there for representing public-key cryptography
4 Kerberos V Cryptography API24 This API provides Kerberos 5-style cryptography for key derivation, encryption
2 /* Asymmetric public-key cryptography data parser
2 /* Asymmetric public-key cryptography key subtype
2 /* Asymmetric Public-key cryptography key type interface
73 using digital certificates and public-key cryptography that eliminate
3 * caam - Freescale FSL CAAM support for Public Key Cryptography descriptors
137 bool "Register public key cryptography implementations with Crypto API"
3 * Processor Activity Instrumentation support for cryptography counters
51 Elliptic Curve Cryptography (ECC) hardware acceleration for use with
41 * Public key cryptography signature data
13 to support other mechanisms like public key cryptography, PKCS#11 and TPM based
192 bool "IPSec XFRM cryptography-offload acceleration"218 bool "IPSec XFRM cryptography-offload acceleration"
44 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')
43 // - RISC-V Vector Cryptography Bit-manipulation extension ('Zvkb')