AT32UC3A0512 usart
Abstract: EVK1100 Atmel EVK1100 freertos AT32UC3A0512 32111C-AVR-11 uc3 timer EVK1100 lwIP SHA-512 AT32UC3A0512 AES
Text: AVR32753: AVR32 UC3 How to connect to an SSL-server Features • Basic HTTPS connection to a web server running on a PC - POLARSSL Library with support of: • Block and stream ciphers: AES, ARC4 DES/3DES • Public-key cryptography: RSA, MPI, Diffie-Hellman
|
Original
|
AVR32753:
AVR32
SHA-256,
SHA-512
32-bit
32111C-AVR-11/09
AT32UC3A0512 usart
EVK1100
Atmel EVK1100
freertos
AT32UC3A0512
32111C-AVR-11
uc3 timer EVK1100
lwIP
SHA-512
AT32UC3A0512 AES
|
PDF
|
Untitled
Abstract: No abstract text available
Text: BCM5821 SUPER E-COMMERCE PROCESSOR SUMMARY OF BENEFITS FEATURES • High-performance public-key processor • Highest performance public key processor enables secure web • 4000 1024-bit RSA transactions per second • 3000 Diffie-Hellman transactions per second
|
Original
|
BCM5821
1024-bit
2048-bit
470-Mbps
600-Mbps
BCM5820
BCM5821
5821-PB03-R
|
PDF
|
BCM5805
Abstract: BCM5820
Text: BCM5820 E-COMMERCE PROCESSOR SUMMARY OF BENEFITS FEATURES • World’s fastest integrated security processor for E-commerce SSL and VPN IKE applications. World’s fastest integrated public-key setup processor includes: • 1250 Diffie-Hellman key exchange pairs per second
|
Original
|
BCM5820
800-bit
048-bit
PKCS-11,
5820-PB06-R
BCM5805
BCM5820
|
PDF
|
BCM5805
Abstract: BCM5820 RSA 1024 chips
Text: BCM5820 PRODUCT Brief BCM5820 E-COMMERCE PROCESSOR B C M 5 8 2 0 F E AT U R E S fastest integrated security processor for • World’s E-commerce SSL and VPN IKE applications. World’s fastest integrated public-key setup processor: • • • • • 1250 Diffie-Hellman key exchange pairs per second
|
Original
|
BCM5820
BCM5820
800-bit
048-bit
PKCS-11,
5820-PB00-R-3
BCM5805
RSA 1024 chips
|
PDF
|
VOIP PROCESSORS
Abstract: HMAC-SHA1-96 HMAC-MD5-96 voip processor HMAC-SHA-1-96 DTLs HIFN 576-PBGA "ESP" voip
Text: Secure VoIP Processors Protocols • SRTP/SRTCP • IPsec – AH, ESP, Tunnel mode, Transport mode • SSL / TLS Symmetric Transforms • AES – 128, 192, 256, ECB, CBC, CTR • DES, 3DES • ARC4 Authentication • SHA-1, MD5 • PK Operations • RSA • Diffie-Hellman
|
Original
|
64-bit/133MHz
64bit
HMAC-MD596
HMAC-SHA1-96
VOIP PROCESSORS
HMAC-MD5-96
voip processor
HMAC-SHA-1-96
DTLs
HIFN
576-PBGA
"ESP"
voip
|
PDF
|
Untitled
Abstract: No abstract text available
Text: Preventing fraud in ePassports and eIDs Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001, in the wake of the terrorist attacks of September 11 in the US,
|
Original
|
1980s,
|
PDF
|
broadcom mips
Abstract: BCM5802 DES Encryption bus ssl
Text: BCM5802 PRODUCT Brief BCM5802 SECURITY PROCESSOR B C M 5 8 0 2 S U M M A R Y F E AT U R E S • Feature rich single-chip security processor integrating full IPSec and IKE acceleration O F B E N E F I T S • Highly integrated security processor • Single-chip IPSec, IKE, SSL/TLS accelerator
|
Original
|
BCM5802
BCM5802
200-byte
5802-PB03-R
broadcom mips
DES Encryption
bus ssl
|
PDF
|
BCM5862
Abstract: No abstract text available
Text: BCM586X NEXT-GENERATION CRYPTONETX IPSEC/SSL SECURITY PROTOCOL PROCESSOR PRODUCT LINE SUMMARY OF BENEFITS FEATURES • High-performance VPN and SSL security processor • Up to 2 Gbps IPSec packet protocol processing • • • • • • • • •
|
Original
|
BCM586X
2241024-bit
BCM5860
BCM5861
BCM5862
586X-PB01-R
BCM5862
|
PDF
|
667 ecb
Abstract: diffie hellman E300 MPC8377 MPC8378 MPC837x RGMII RGMII SGMII MPC8377E MPC8378E
Text: Integrated Communications Processors MPC837x PowerQUICC II Pro Overview Today’s small-to-medium business SMB and consumer applications are driving the need for highly integrated and cost effective solutions that deliver high performance. The next generation PowerQUICC® II Pro MPC837x
|
Original
|
MPC837x
MPC837x
MPC837XFFS
667 ecb
diffie hellman
E300
MPC8377
MPC8378
RGMII
RGMII SGMII
MPC8377E
MPC8378E
|
PDF
|
BCM5862
Abstract: BCM5825 BCM5821 BCM5823 diffie hellman random initialization vector
Text: BCM586X NEXT-GENERATION CRYPTONETX IPSEC/SSL SECURITY PROTOCOL PROCESSOR PRODUCT LINE SUMMARY OF BENEFITS FEATURES • High-performance VPN and SSL security processor • Up to 2 Gbps IPSec packet protocol processing • • • • • • • • •
|
Original
|
BCM586X
2241024-bit
BCM5860
BCM5861
BCM5862
586X-DS02-R
BCM5862
BCM5825
BCM5821
BCM5823
diffie hellman
random initialization vector
|
PDF
|
Untitled
Abstract: No abstract text available
Text: CR15iNG Future-ready Future-ready Security for SOHO/ROBO networks Data Sheet CR15iNG Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features and performance required for future networks. The NG
|
Original
|
CR15iNG
|
PDF
|
dewalt
Abstract: MPC8548E public key encryption DPDS PowerQUICC Processors "IKEv1"
Text: Secure Communications Solutions Secure Communications Architecture for PowerQUICC Processors Secure Network Traffic: A Market Imperative Figure 1: Secure Communications Architecture Network security threats are real and Mocana Device Security Framework
|
Original
|
SHA1/22
SHA-384/512
dewalt
MPC8548E
public key encryption
DPDS
PowerQUICC Processors
"IKEv1"
|
PDF
|
omron V2C
Abstract: No abstract text available
Text: CR15wiNG Future-ready CR15wiNG Data Sheet Future-ready Security with Wi-Fi Access Point for SOHO/ROBO networks CR15wiNG is the Next-Generation Unified Threat Management appliance with Wi-Fi access points that offer “the fastest UTMs made for SMBs” to small offices with high performance security over WLAN.
|
Original
|
CR15wiNG
CR15wiNG
11a/b/g/n
omron V2C
|
PDF
|
Untitled
Abstract: No abstract text available
Text: 01,02 W 05,06 ESC UP DOWN ENTER 17,18 11,12 19,20 21,22 HDD 42 07,08 15,16 13,14 25,26 POWER 41 03,04 09,10 CR 1000iNG-XP 27,28 35,36 33,34 23,24 31,32 29,30 37,38 39,40 CONSOLE FleXi Ports Module 8-port 1 GbE Copper Module 8-port 1 GbE Fiber Module 4-port 10 GbE Fiber Module
|
Original
|
1000iNG-XP
CR1000iNG-XP
CR1000iNGâ
trends60
|
PDF
|
|
Voice encryption
Abstract: 3g call flow secure wireless data communication mindspeed voip wireless encrypt
Text: August 26, 2004 Article on Secure Voice by N.Rossello Secure Voice For Communication Over Packet Network Dr. Norbert Rossello Laurent Pilati Fabien Klein Mindspeed Technologies August 26, 2004 Article on Secure Voice by N.Rossello Contents 1. Introduction. 3
|
Original
|
828xx-WTP-001-A
Voice encryption
3g call flow
secure wireless data communication
mindspeed voip
wireless encrypt
|
PDF
|
Voice encryption
Abstract: wireless encrypt
Text: Encryption Products Catalogue 1 Introduction to Cryptography 1.1 History of Cryptography Cryptography is almost as old as civilization. The human desire for privacy when communicating leads inevitably to cryptography. Webster's Dictionary describes cryptography as: "the art or practice of preparing messages in a form intended to prevent their
|
Original
|
|
PDF
|
DES Encryption TMS320
Abstract: TMS320 sssa001 wireless ciphertext encryption key wireless wireless encrypt merkle
Text: Introduction to Cryptanalysis and Public Key Cryptography APPLICATION REPORT: SSSA001 Gene Lin DSP Application Engineer Texas Instruments Taiwan Limited Digital Signal Processing Solutions November, 1997 IMPORTANT NOTICE Texas Instruments TI reserves the right to make changes to its products or to discontinue any
|
Original
|
SSSA001
DES Encryption TMS320
TMS320
sssa001
wireless ciphertext
encryption key wireless
wireless encrypt
merkle
|
PDF
|
dsp algorithms using tms320c50
Abstract: architecture of TMS320C50 applications DES Encryption TMS320 specifications of TMS320C50 architecture of TMS320C50 TMS320 TMS320C50 LPC-10 tm5320 LZ77
Text: Disclaimer: This document was part of the First European DSP Education and Research Conference. It may have been written by someone whose native language is not English. TI assumes no liability for the quality of writing and/or the accuracy of the information contained herein.
|
Original
|
TMS320C50
SPRA318
ICSPAT96,
TMS320C5x
dsp algorithms using tms320c50
architecture of TMS320C50 applications
DES Encryption TMS320
specifications of TMS320C50
architecture of TMS320C50
TMS320
LPC-10
tm5320
LZ77
|
PDF
|
architecture of TMS320C50
Abstract: architecture of TMS320C50 applications addressing modes of TMS320C50 dsp processor Architecture of TMS320C5X specifications of TMS320C50 TMS320C50 DES Encryption TMS320 dsp algorithms using tms320c50 linear convolution in TMS320C50 linear predictive coding
Text: Disclaimer: This document was part of the First European DSP Education and Research Conference. It may have been written by someone whose native language is not English. TI assumes no liability for the quality of writing and/or the accuracy of the information contained herein.
|
Original
|
TMS320C50
SPRA318
ICSPAT96,
TMS320C5x
architecture of TMS320C50
architecture of TMS320C50 applications
addressing modes of TMS320C50
dsp processor Architecture of TMS320C5X
specifications of TMS320C50
DES Encryption TMS320
dsp algorithms using tms320c50
linear convolution in TMS320C50
linear predictive coding
|
PDF
|
PCC-ISES
Abstract: PCC2020 mppc 01 PS-1250 BCM5821 MPC180 NetOctave rc5 protocol MPC190 BCM5820
Text: Freescale Semiconductor, Inc. Freescale Semiconductor, Inc. Security Application Note Neil Gammage Technical Marketing Motorola Canada Release 2.1 Date 12/13/01 Product C-5 NP/C-5e NP Relevant version All Description Describes security implementations with the
|
Original
|
HMAC-SHA-1-96
HMAC-RIPEMD-160-96
PCC-ISES
PCC2020
mppc 01
PS-1250
BCM5821
MPC180
NetOctave
rc5 protocol
MPC190
BCM5820
|
PDF
|
PCC-ISES
Abstract: PS-1250 BCM5821 PCC2020 BCM5820 BCM5840 MPC180 MPC190 public key encryption "ESP"
Text: Freescale Semiconductor, Inc. Freescale Semiconductor, Inc. Security Application Note Neil Gammage Technical Marketing Freescale Canada Release 2.1 Date 12/13/01 Product C-5 NP/C-5e NP Relevant version All Description Describes security implementations with the
|
Original
|
HMAC-SHA-1-96
HMAC-RIPEMD-160-96
PCC-ISES
PS-1250
BCM5821
PCC2020
BCM5820
BCM5840
MPC180
MPC190
public key encryption
"ESP"
|
PDF
|
caller id
Abstract: GKEK MA-COM rc5 protocol 339B C907 seed key
Text: IRE Secure Solutions, Inc. ADSP 2141 ‘CryptIC ‘ CGX INTERFACE PROGRAMMER’S GUIDE PART II: COMMAND LISTING Revision 2, December 1998 IRE Secure Solutions, Inc. maintains a Web site with up-to-date technical documentation for our customers. It is located at:
|
Original
|
|
PDF
|
GKEK
Abstract: free circuit diagram of Crt Monitor with fault ADSP 2141 CGX Programmers Guide ba pass 1st sem date sheet crt monitor circuit diagram first sem engineering ..registration last date block diagram of pentium D Laser power supply abstract types of trees in data structure RFC1321
Text: IRE Secure Solutions, Inc. ADSP 2141 ‘SafeNet DSP ‘ CGX INTERFACE PROGRAMMER’S GUIDE PART I: OVERVIEW & OBJECTS Revision 2, June 1999 IRE Secure Solutions, Inc. maintains a Web site with up-to-date technical documentation for our customers. It is located at:
|
Original
|
|
PDF
|
AN3645
Abstract: MACsec AES gcm AN2755 CRC32 MPC8541E MPC8555E SHA-256 SHA-384 SHA-512
Text: Freescale Semiconductor Application Note Document Number: AN3645 Rev.1, 08/2009 SEC 2/3x Descriptor Programmer’s Guide by Networking and Multimedia Group Freescale Semiconductor, Inc This application note is offered as a supplement to the reference manuals of the PowerQUICC II Pro and
|
Original
|
AN3645
MPC8555E
MPC8541E
AN2755,
and1363
AN3645
MACsec
AES gcm
AN2755
CRC32
SHA-256
SHA-384
SHA-512
|
PDF
|