Searched full:cryptography (Results 1 – 25 of 43) sorted by relevance
12
201 The standard Zbkb bitmanip instructions for cryptography as ratified202 in version 1.0 of RISC-V Cryptography Extensions Volume I208 in version 1.0 of RISC-V Cryptography Extensions Volume I214 in version 1.0 of RISC-V Cryptography Extensions Volume I244 The standard Zk Standard Scalar cryptography extension as ratified245 in version 1.0 of RISC-V Cryptography Extensions Volume I251 version 1.0 of RISC-V Cryptography Extensions Volume I257 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I263 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I269 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I[all …]
128 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.131 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.134 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.137 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.140 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.143 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.146 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.149 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.152 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.155 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.
119 …"PublicDescription": "This counter counts the total number of the elliptic-curve cryptography (ECC…126 …cycles when the ECC coprocessor is busy performing the elliptic-curve cryptography (ECC) functions…133 …"PublicDescription": "This counter counts the total number of the elliptic-curve cryptography (ECC…140 … counts the total number of CPU cycles blocked for the elliptic-curve cryptography (ECC) functions…
15 Cryptography (ECC) device provides hardware acceleration for elliptic curve16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
263 cryptography267 cryptography270 number of TX and RX sessions opened with host cryptography273 number of TX and RX sessions opened with NIC cryptography279 number of RX resyncs sent to NICs handling cryptography
149 Build support for MACsec cryptography-offload acceleration in the NIC.157 Build support for IPsec cryptography-offload acceleration in the NIC.165 Build support for TLS cryptography-offload acceleration in the NIC.
67 | Enables :ref:`IPSec XFRM cryptography-offload acceleration <xfrm_device>`.72 | Build support for MACsec cryptography-offload acceleration in the NIC.83 | TLS cryptography-offload acceleration.
4 Asymmetric / Public-key Cryptography Key Type22 public-key cryptography, without imposing any particular restrictions on the23 form or mechanism of the cryptography or form of the key.92 Three enums are defined there for representing public-key cryptography
2 /* Asymmetric public-key cryptography data parser
2 /* Asymmetric public-key cryptography key subtype
2 /* Asymmetric Public-key cryptography key type interface
71 using digital certificates and public-key cryptography that eliminate
3 * Processor Activity Instrumentation support for cryptography counters
203 unsigned long ccc : 1; /* Cryptography counter control */
205 /* Cryptography-counter designation */
3 * caam - Freescale FSL CAAM support for Public Key Cryptography descriptors
137 bool "Register public key cryptography implementations with Crypto API"
51 Elliptic Curve Cryptography (ECC) hardware acceleration for use with
13 to support other mechanisms like public key cryptography, PKCS#11 and TPM based
40 * Public key cryptography signature data
189 bool "IPSec XFRM cryptography-offload acceleration"215 bool "IPSec XFRM cryptography-offload acceleration"
7 * (see Applied Cryptography, 2nd edition, p448).
247 menu "Public-key cryptography"1029 This is part of the Chinese Commercial Cryptography suite.