Searched full:cryptography (Results 1 – 11 of 11) sorted by relevance
215 The standard Zbkb bitmanip instructions for cryptography as ratified216 in version 1.0 of RISC-V Cryptography Extensions Volume I222 in version 1.0 of RISC-V Cryptography Extensions Volume I228 in version 1.0 of RISC-V Cryptography Extensions Volume I295 The standard Zk Standard Scalar cryptography extension as ratified296 in version 1.0 of RISC-V Cryptography Extensions Volume I302 version 1.0 of RISC-V Cryptography Extensions Volume I308 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I314 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I320 ratified in version 1.0 of RISC-V Cryptography Extensions Volume I[all …]
128 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.131 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.134 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.137 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.140 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.143 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.146 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.149 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.152 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.155 defined in version 1.0 of the RISC-V Cryptography Extensions Volume II.
15 Cryptography (ECC) device provides hardware acceleration for elliptic curve16 cryptography using the NIST P-256 and NIST P-384 elliptic curves.
263 cryptography267 cryptography270 number of TX and RX sessions opened with host cryptography273 number of TX and RX sessions opened with NIC cryptography279 number of RX resyncs sent to NICs handling cryptography
18 * Software crypto mode (``TLS_SW``) - CPU handles the cryptography.
67 | Enables :ref:`IPSec XFRM cryptography-offload acceleration <xfrm_device>`.72 | Build support for MACsec cryptography-offload acceleration in the NIC.83 | TLS cryptography-offload acceleration.
4 Asymmetric / Public-key Cryptography Key Type22 public-key cryptography, without imposing any particular restrictions on the23 form or mechanism of the cryptography or form of the key.92 Three enums are defined there for representing public-key cryptography
13 to support other mechanisms like public key cryptography, PKCS#11 and TPM based
89 cryptography, etc., basically any memory to memory operation.
406 cryptography (NISTP).
541 complexity is not inherent to the cryptography itself.