Implementing Cryptographic Pairings on Smartcards

The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.

Подобные документы

  • Resistance of randomized projective coordinates against power analysis. Energy-efficient software implementation of long integer modular arithmetic. Special hardware sieving device for factoring 1024-bit integers. Hardware attacks and countermeasures.

    ???? ??????, добавлен 08.03.2014

  • A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.

    ?????, добавлен 08.03.2014

  • The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.

    ????????? ??????, добавлен 31.10.2016

  • Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.

    ????????? ??????, добавлен 01.04.2010

  • Describe the architecture for building a cloud-based SaaS application platform, the main characteristics of the services. Creating a software template for the device of communication inherited of air transport, the use of algebras of real-time processes.

    ??????, добавлен 25.10.2016

  • Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.

    ????????? ??????, добавлен 28.08.2016

  • Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.

    ?????, добавлен 08.03.2014

  • Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.

    ?????, добавлен 08.03.2014

  • Serverless architecture has emerged as a revolutionary paradigm in cloud computing, offering developers a scalable and cost-effective approach to building applications. Serverless architecture, focusing on its key components, benefits, challenges.

    ??????, добавлен 10.10.2024

  • The design of a von Neumann architecture machine. A stored-program digital computer. Development of the stored-program concept. Early von Neumann-architecture computers. Von Neumann bottleneck. Features of Von Neumann Architecture. Arithmetic Logic Unit.

    ???????????, добавлен 25.10.2017

  • Encryption standard adopted by the USA government through a competitive Advanced Encryption Standard. Evaluation algorithms for the various platforms. Cryptographic analysis and its properties. Testing of individual algorithms. Algorithmic version of AES.

    ?????, добавлен 15.09.2012

  • The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.

    ???? ??????, добавлен 08.03.2014

  • A concept of a decision support system (DSS) for modeling and forecasting of economic and financial processes is proposed as well as its software implementation. The main functions of the DSS are in modeling of nonstationary nonlinear time series.

    ??????, добавлен 29.07.2016

  • ??????????? ? ?????????? ?? ?????????? ????? ??????????. ???????? ?????????? ??????????? ??????????. ?????????? ????????? ????. ?????????? ?????????? ? ?????????? ??????????? ??????. ?????????? ? ?????? ??????? ? MIPS. ????? ?????? ??????????? MIPS.

    ???????????, добавлен 13.10.2016

  • Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.

    ???? ??????, добавлен 08.03.2014

  • A problem of binary pseudo random sequences creation of cryptographic security system for sequences of maximal length, with static characteristics. The questions of Galois and Fibonacci of creation primitive matrices random size over the simple field.

    ??????, добавлен 22.12.2016

  • ??????????? ??????????? MIPS ???????? MIPS Technology. ??? ?????? ?????? ??????? ??????. ????????? ?????? ????????. ????????? ???????? ??????. ?????????? ????????? ?????. ??????????? ?????? ???????????? ???????. ???????????? ???????????? ??????? Linux.

    ????????? ??????, добавлен 14.03.2013

  • Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.

    ??????? ???????, добавлен 15.09.2012

  • ??????? ????? ??????? ? ??????? ?????? ??????????????? ????????????? ? ?????????????? ???????????? ???????? ?????? ??? ???? ?? ?????????????? ???????????? ????????? "Classic". ??????? ??????? ???????????? ??????? ??????? ? ???????? ???????? ???????.

    ???????????? ??????, добавлен 25.05.2014

  • The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.

    ??????, добавлен 23.02.2016

  • The phenomenon of virtual reality, as a tool of achieving interactive behavior in architecture and built environment. Various possibilities for improving the quality of environment and space, both real and existing only within alternative perception.

    ??????, добавлен 30.07.2018

  • The values of indicators of the quality of TCP connections specific to each type of Slow HTTP-attacks. A mathematical model formalizing the behavior of the web server when implementing Slow HTTP-attacks of various types, architecture of detection.

    ??????, добавлен 14.01.2017

  • Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.

    ??????, добавлен 19.07.2020

  • Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.

    ??????, добавлен 16.06.2024

  • ???????????? ???????????? ????????? ??????? ???????? ? ???????? ???????? ????? ??????? Time ? ?????? ???????? ????????? ???-???????. ??????????? ? ?????????????? ????????? ??????????, ????????? ??????? ? ???????????? ???????? ????????? ?????????.

    ??????, добавлен 04.03.2023

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.