Cryptographic hardware and embedded systems
Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.
Подобные документы
Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.
статья, добавлен 28.02.2016Modelling Rich Interaction: status–event analysis, sensor-based systems, rich environments in task analysis. Screen-button – HIT, MISS, widget. GTA - conceptual framework, tools, elicitation techniques. The main functions placeholders, its types.
презентация, добавлен 28.12.2013Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.
статья, добавлен 30.04.2018One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.
статья, добавлен 15.09.2012Using the analysis of eye movement and gaze direction in online testing systems of students' knowledge. Analysis of creating the same conditions for computer testing for all students and improving the level of knowledge obtained by the test results.
статья, добавлен 12.05.2024Robots as mechanical assistants of a person who are able to perform operations based on the program, embedded in them, and respond to the environment. Acquaintance with the transhumanist significance of robotics. Analysis of the scope of robots.
презентация, добавлен 03.04.2018Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
статья, добавлен 16.06.2024Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
статья, добавлен 06.05.2018The principle of quantum cryptography. Quantum no-cloning theorem. State detection and random number generator. Verify assumptions used in a security proof. Quantum hacking and countermeasures from this. Introduction of cryptography for engineers.
книга, добавлен 08.03.2014Methods of classification of correlation extremal navigation systems, geophysical fields. The block diagram of CENS, which works in risk conditions. Dependence of posteriori probability on the quantity of key points and total error of its determination.
статья, добавлен 26.06.2016A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
книга, добавлен 08.03.2014Documentation for the software systems as an important factor in maintenance. Status of the existing documentation practices as well as an overview of the quality of the documentation. Creating a discussion of current practices, analysis of the results.
статья, добавлен 23.02.2016Багатозначна модель компонентів цифрової системи на кристалі вентильного та регістрового рівнів для аналізу перехідних процесів. Програмно-апаратний комплекс MV-HES (Multi-Valued Hardware Embedded Simulator), що дозволяє верифікувати складні цифрові SoC.
автореферат, добавлен 28.09.2015The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
статья, добавлен 25.06.2024The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.
учебное пособие, добавлен 08.03.2014The algorithm and program in MAPLE for the solution ordinary differential equations of IV order in the form of generalized power series. Some examples of the solution differential equations IV order. The singular regular points of differential equation.
статья, добавлен 01.02.2019The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.
статья, добавлен 30.07.2016The definition of Green-orientation of modern CAD systems to optimize FPGA-projects on energy consumption based on the activity signals of the scheme. Method of estimation of FPGA-project in the distribution of the dynamic component of power consumption.
статья, добавлен 23.02.2016Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
книга, добавлен 08.03.2014Cryptography is the science of using mathematics to encrypt and decrypt data. PGP data compression routines, the random numbers used as session keys, the message digest. Compromised passphrase and private key. Protecting against bogus timestamps.
дипломная работа, добавлен 08.03.2014Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
курс лекций, добавлен 08.03.2014Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.
учебное пособие, добавлен 11.10.2014The main situations and problems that inevitably arise during the work of testing engineers, which can be solved by using mobile applications in the Charles program. Conducting testing of mobile applications on iOS and Android operating systems.
статья, добавлен 08.12.2024Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
лабораторная работа, добавлен 17.03.2016The physical principles of meteor radio. A block diagram of hardware and software for sensing meteor trails. The principles of software-defined radio system. А functional diagram of a digital oscillator. shortcomings. Range and security meteor radio.
статья, добавлен 06.05.2018