Blinded fault resistant exponentiation

The issue of many public key cryptosystems and application of embedded devices for this setup. Present an algorithm that also inherently thwarts differential side-channel attacks in finite abelian groups with only limited time and storage overhead.

Подобные документы

  • An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.

    статья, добавлен 15.09.2012

  • Development of software applications, tools settings of the information system. The connection of additional interfaces and applications, tools to create, configure and manage database tools to generate reports in MS Word, edit them on the server side.

    дипломная работа, добавлен 02.05.2015

  • The creation of an intuitive family tree on the basis of the online service Coggle, which is designed to develop mental maps. The main criteria that should be in the program for mobile application development. Structure of the mobile application.

    статья, добавлен 06.06.2023

  • A Bayesian algorithm for determining the statistical accuracy factor, which can be used to estimate the accuracy characteristics of on-board automatic landing system on the stage of operational control. Solution of the statistical accuracy problem.

    статья, добавлен 26.06.2016

  • The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.

    статья, добавлен 23.02.2016

  • The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.

    книга, добавлен 08.03.2014

  • Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.

    дипломная работа, добавлен 28.08.2016

  • Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.

    книга, добавлен 08.03.2014

  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    книга, добавлен 08.03.2014

  • Развитие программного продукта Blender, применяемого для трехмерного моделирования и анимации. Релиз новой версии Blend4Web 17.10 для экспорта готовых сцен в веб. Функции: режим отображения Side-By-Side, Cycles-ноды, улучшение редактора нодовой логики.

    статья, добавлен 25.02.2019

  • Mobile devices as an integral part of a person’s daily life. Familiarize yourself with the basics for getting started developing applications, such as choosing an IDE and installing Java. Analysis of the history of creating the Android operating system.

    статья, добавлен 12.02.2019

  • Назначение свойств Assistant, BrokenReference, Build, CodeContextObject, CommandBars, CurrentObjectName, CurrentObjectType, DBEngine, IsCompiled, MenuBar, Modules, ProductCode. Краткое описание наиболее показательных методов объекта Application.

    контрольная работа, добавлен 10.06.2011

  • A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.

    книга, добавлен 08.03.2014

  • Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.

    реферат, добавлен 31.10.2012

  • International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.

    книга, добавлен 08.03.2014

  • Improvement of devices containing electronic elements. Application of mechatronic systems in the automotive industry. Using Solidworks software for the design of mobile robot on four or more wheeled chassis. Calculation of stresses of structural parts.

    статья, добавлен 13.10.2020

  • Рассмотрение особенностей структуры главной страницы и домашней страницы сайта журнала Time с учетом основных тенденций веб-дизайна. Определение и характеристика специфики композиции, цветового решения и соответствие основным принципам юзабилити.

    статья, добавлен 04.03.2023

  • Linguistic and numerical auxiliary quantities and the definition of auxiliary functions and a system of rules through them. The implementation of the proposed decision algorithm as a result of modeling processes that are performed by the operator.

    статья, добавлен 25.10.2016

  • The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.

    статья, добавлен 20.01.2016

  • The characteristics and features of the method for assessing the changes of health system with multiple levels of efficiency, depending on the state change of its elements. The essence, the specificity of logical differential calculus, multivalue logic.

    статья, добавлен 28.02.2016

  • Изучение верификации проекта на стадии моделирования как одной из важнейших проблем при моделировании электронных систем, состоящих из цифровых и аналоговых модулей. Описание визуализации растрового изображения видеокадров протокола Fibre Channel.

    статья, добавлен 27.05.2018

  • Development of a method for time series prediction, which dynamically finds weights for the input factors. Validation of the proposed method on a set of real time series, the assessment of its results in comparison with the method used as the base.

    автореферат, добавлен 30.01.2016

  • Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.

    статья, добавлен 10.08.2018

  • The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.

    дипломная работа, добавлен 31.10.2016

  • A random access memory. Examples of peripheral devices: expansion card, video card, image scanners, tape drives, microphones, speakers, web and digital cameras. Network or shared printers. Print three-dimensional objects. Printing 3D models from STL file.

    реферат, добавлен 09.12.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.