Blinded fault resistant exponentiation
The issue of many public key cryptosystems and application of embedded devices for this setup. Present an algorithm that also inherently thwarts differential side-channel attacks in finite abelian groups with only limited time and storage overhead.
Подобные документы
An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.
статья, добавлен 15.09.2012Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
статья, добавлен 27.10.2020Development of software applications, tools settings of the information system. The connection of additional interfaces and applications, tools to create, configure and manage database tools to generate reports in MS Word, edit them on the server side.
дипломная работа, добавлен 02.05.2015A Bayesian algorithm for determining the statistical accuracy factor, which can be used to estimate the accuracy characteristics of on-board automatic landing system on the stage of operational control. Solution of the statistical accuracy problem.
статья, добавлен 26.06.2016The creation of an intuitive family tree on the basis of the online service Coggle, which is designed to develop mental maps. The main criteria that should be in the program for mobile application development. Structure of the mobile application.
статья, добавлен 06.06.2023The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.
статья, добавлен 23.02.2016The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.
книга, добавлен 08.03.2014Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.
дипломная работа, добавлен 28.08.2016Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
книга, добавлен 08.03.2014Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
книга, добавлен 08.03.2014Mobile devices as an integral part of a person’s daily life. Familiarize yourself with the basics for getting started developing applications, such as choosing an IDE and installing Java. Analysis of the history of creating the Android operating system.
статья, добавлен 12.02.2019Развитие программного продукта Blender, применяемого для трехмерного моделирования и анимации. Релиз новой версии Blend4Web 17.10 для экспорта готовых сцен в веб. Функции: режим отображения Side-By-Side, Cycles-ноды, улучшение редактора нодовой логики.
статья, добавлен 25.02.2019Назначение свойств Assistant, BrokenReference, Build, CodeContextObject, CommandBars, CurrentObjectName, CurrentObjectType, DBEngine, IsCompiled, MenuBar, Modules, ProductCode. Краткое описание наиболее показательных методов объекта Application.
контрольная работа, добавлен 10.06.2011A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
книга, добавлен 08.03.2014Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
реферат, добавлен 31.10.2012International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
книга, добавлен 08.03.2014Improvement of devices containing electronic elements. Application of mechatronic systems in the automotive industry. Using Solidworks software for the design of mobile robot on four or more wheeled chassis. Calculation of stresses of structural parts.
статья, добавлен 13.10.2020Рассмотрение особенностей структуры главной страницы и домашней страницы сайта журнала Time с учетом основных тенденций веб-дизайна. Определение и характеристика специфики композиции, цветового решения и соответствие основным принципам юзабилити.
статья, добавлен 04.03.2023Linguistic and numerical auxiliary quantities and the definition of auxiliary functions and a system of rules through them. The implementation of the proposed decision algorithm as a result of modeling processes that are performed by the operator.
статья, добавлен 25.10.2016The characteristics and features of the method for assessing the changes of health system with multiple levels of efficiency, depending on the state change of its elements. The essence, the specificity of logical differential calculus, multivalue logic.
статья, добавлен 28.02.2016The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.
статья, добавлен 20.01.2016Изучение верификации проекта на стадии моделирования как одной из важнейших проблем при моделировании электронных систем, состоящих из цифровых и аналоговых модулей. Описание визуализации растрового изображения видеокадров протокола Fibre Channel.
статья, добавлен 27.05.2018Development of a method for time series prediction, which dynamically finds weights for the input factors. Validation of the proposed method on a set of real time series, the assessment of its results in comparison with the method used as the base.
автореферат, добавлен 30.01.2016Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.
статья, добавлен 10.08.2018A random access memory. Examples of peripheral devices: expansion card, video card, image scanners, tape drives, microphones, speakers, web and digital cameras. Network or shared printers. Print three-dimensional objects. Printing 3D models from STL file.
реферат, добавлен 09.12.2014