Cryptographic hardware and embedded systems
Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
Подобные документы
The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
???? ??????, добавлен 08.03.2014Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
???????????, добавлен 06.02.2017Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.
???? ??????, добавлен 08.03.2014The physical principles of meteor radio. A block diagram of hardware and software for sensing meteor trails. The principles of software-defined radio system. ? functional diagram of a digital oscillator. shortcomings. Range and security meteor radio.
??????, добавлен 06.05.2018The basic approaches to developing application software and computer system components. The generations of object-oriented programming languages. Types of computer systems and secondary storage, storage area network and output devices of information.
???????????, добавлен 10.06.2016Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.
??????? ???????, добавлен 11.10.2014Control the computer's resources, the hardware, software as one of the operating systems main tasks. The use of a graphical user interface that eliminates the need to learn complex commands - a feature of the operating systems of the Windows family.
???????????, добавлен 20.04.2016The nodes of computer facilities and microprocessor systems. Architecture and software models of Intel microprocessors. Microprocessor systems on universal microprocessors and its programming. Microprocessor systems on microcontrollers and programming.
?????????, добавлен 11.10.2014Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
???????????? ??????, добавлен 17.03.2016Characteristics of the model research cyber-physical systems in industrial production. Description of the hardware installation process and software environment. Consideration of modern approaches to modeling distributed software and semantic data.
??????, добавлен 23.02.2016Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.
?????, добавлен 13.03.2014The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.
?????, добавлен 08.03.2014Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
??????, добавлен 22.12.2016Rubik’s cube 3D model. Hardware and software systems for rubik’s cube solving. Designing and developing application for assembling a rubik's cube. Preventing wrong moves algorithm. Introduction to group theory and permutation puzzles. Computer vision.
????????? ??????, добавлен 01.12.2019Sensor - a device that measures physical quantity and converts it into a signal. The context-aware systems a combination of hardware and software that analyze the state of the user and the environment and adapt their work to the changing condition.
??????, добавлен 30.04.2019Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
??????, добавлен 16.06.2024?????????????? ????? ? ??????? ? ????????? ?????, ????????, ?????????, ????????, ??????? ? ?????? ??????????, ?????????????? ??????????? ?? ????????????? ??? ???????? ???????. ???????????? ????????? ?????? ???????????: hardware, software, brainware.
???????, добавлен 08.02.2015A test-bed for research cyber-physical production systems and the hardware setup and the software environment. A new approach for distributed software and semantic data modelling is introduced. System SEPIA - ? semantic cyber-physical system approach.
??????, добавлен 23.02.2016The principles of construction of the integrated modular avionics aircraft and its functional elements. Methods and means of control of IMA computer systems. Evaluate the reliability of IMA computing structures for different hardware configurations.
??????, добавлен 13.07.2022A study of the causes of the problematic situation regarding the use of software for financial and accounting of Russian production. Recommendations for further action are considered. Forming a policy for the introduction of new software products.
??????, добавлен 15.02.2021The improving the network traffic analysis systems, including deep analysis systems, taking into account existing threats and vulnerabilities of network equipment and software of computer networks based on methods and algorithms of machine learning.
??????, добавлен 12.12.2024??????? ?? ????????????? ???????????? ???????. ????? ?????????? ? ??????????? ??????????? ?????????? ? ??????? "software" ? "hardware". ????? ????????????????? ?????????????? ??????????? ? ??????????? ? ?????????????? ?????????? ????????????????.
???????, добавлен 18.11.2013Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
??????, добавлен 06.05.2018Computer facilities and microprocessor systems and data manipulation. Digital automata synthesis. Programming of Intel microprocessors, generic architecture. Construction principles of telecommunications nodes. Initialization of purpose registers.
?????????, добавлен 11.10.2014The nature and characteristics of distributed operating systems. Characteristic and distinctive features of operating systems real-time. Description, application and purpose multiprocessor operating systems, its role and place in computer security.
???????????, добавлен 25.09.2016