TITLE

PROCESSOR RUNS AT WIRE SPEED

AUTHOR(S)
Cravotta, Nicholas
PUB. DATE
May 2000
SOURCE
EDN;05/25/2000, Vol. 45 Issue 11, p26
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the availability of the Luna 340 cryptographic accelerator from Chrysalis-ITS Inc. Product applications; Support of different encryption algorithms and protocols; Product price; Contact information.
ACCESSION #
3194815

 

Related Articles

  • Encryption key to VPN boost. Lawson, Stephen // InfoWorld;04/12/99, Vol. 21 Issue 15, p12 

    Predicts an increase in virtual private network (VPN) capabilities in the year 2000 due to encryption coprocessors from hardware manufacturing firms Chrysalis-ITS and Hi/fn Inc. Features of the coprocessors; Views of analysts on the router solution to VPN.

  • Tales from the crypto. Bracco, Terre // Network World;05/22/2000, Vol. 17 Issue 21, p71 

    Evaluates the Rainbow Technologies CryptoSwift 600 and nCipher nForce 300 Cryptographic Accelerator. Functions and features; Key specifications; Capability to support data encryption transactions; Ease of use; Scalability; Overall performance.

  • ISED's encryption unit helps banks reach small merchants. J.L.P. // Bank Marketing;Feb96, Vol. 28 Issue 2, p55 

    Reports on ISED Corp.'s introduction of the secure encryption device (SED), a hardware-based encryption device that allows banks to provide small retail merchants access to electronic banking and credit/debit card transactions. Advantages.

  • Chrysalis-ITS Gets Intel Infusion. HABER, CAROL // Electronic News;02/15/99, Vol. 45 Issue 2257, p38 

    Reports that Chrysalis-ITS has closed a private financing. Lead investors; Comments from Michael Glancy, general manager of the Platform Security Division of Intel; Brief information on the security processing products of Chrysalis-ITS.

  • OMLIS AND IBM DEBUT ENTERPRISE SECURITY TECHNOLOGY.  // Audiotex Update;Sep2015, Vol. 27 Issue 9, Special section p4 

    The article discusses the launch of the Secure Enterprise Messenger (SEM) encryption technology from International Business Machine (IBM) and Omlis.

  • ATM encryption: Faster, easier. Messmer, Ellen // Network World;02/08/99, Vol. 16 Issue 6, p30 

    Evaluates the asynchronous transfer mode (ATM) encryption units and services from various vendors. Includes Celotek CelloCase ATM encryption unit; Heuristic defense infrastructure and intrusion detection service from Pilot Network Services.

  • Prying Eyes, Keep Out. Branscum, Deborah // Newsweek (Atlantic Edition);06/12/2000 (Atlantic Edition), Vol. 135 Issue 24, p75 

    Discusses several companies that improve the privacy of e-mail systems. Programs by QVtech and Disappearing Inc. which work with Microsoft Outlook and allow messages to be read only by the designated recipient; How the software digitally encrypts messages; Details of ZipLip.com's offering;...

  • Enhanced authentication for WLAN-EPS interworking systems. Bassoli, R.; Marques, H.; Rodriguez, J.; Gruet, C.; Tafazolli, R. // Electronics Letters;9/17/2015, Vol. 51 Issue 19, p1544 

    Novel authentication procedures for interworking wireless local area networks and evolved packet system are proposed for the 3GPP TS 33.402 (released 12 September 2014) standard. The novel solutions mainly exploit public-key fully homomorphic encryption schemes and one-way functions. This not...

  • Chaos breeds order. Rambler, Mark; Hayden, Tom; Kwon, Beth // Newsweek (Pacific Edition);03/16/98 (Pacific Edition), Vol. 131 Issue 11, p8A 

    Mentions a data-encryption method created by Georgia Tech researchers Rajarshi Roy and Gregory Van Wiggeren. Use of a laser to hide sensitive data.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics