Chapter 6 Cryptographic Hardware Setup and Tuning
Table of Contents
Configuring Ciphers and MACs
Access to Hardware Support to Generate Random Numbers
Enabling Cryptographic Hardware
Verifying that Cryptographic Hardware is Used
Optimizing Performance