Implementing Cryptographic Pairings on Smartcards

The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.

Подобные документы

  • Характеристика программы Time Boss, легкость ее использования и особенности функционала. Анализ понятия родительский контроль и его необходимость. Определение временных параметров работы пользователя. Настройка окна предупреждения, установка фильтров.

    статья, добавлен 25.07.2018

  • Electroencephalography and Magnetoencephalography provide insight into neuronal processes in the brain in a real-time scale. This renders these modalities particularly interesting for online analysis methods to visualize brain activity in real-time.

    статья, добавлен 23.06.2016

  • Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.

    дипломная работа, добавлен 10.12.2019

  • Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

    книга, добавлен 08.03.2014

  • A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.

    статья, добавлен 15.09.2012

  • Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.

    статья, добавлен 26.10.2016

  • One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.

    статья, добавлен 15.09.2012

  • Архитектура современных восьмиразрядных микроконтроллеров фирмы Philips на базе серии MCS-51 фирмы Intel. Классификация системы команд по базовому признаку. Способы адресации данных. Встроенные устройства микроконтроллеров серии AVR фирмы Atmel.

    реферат, добавлен 25.11.2009

  • Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.

    презентация, добавлен 28.12.2013

  • The regression models of software project duration based on project effort. Equations of confidence interval of a non-linear regression model of software project duration based on Johnson transformation for the personal computer development platform.

    статья, добавлен 22.03.2016

  • Levels of programming support tools. Elements of windowing systems. Possible software architectures. Using toolkits for objects interaction. Paradigms for programming interfaces in applications. Implementation of user interface management systems (UIMS).

    презентация, добавлен 28.12.2013

  • Development of the program, applying the technique of surface voxelization of 3D-models based on graphic processes. Review of existing methods voxelization 3D-scenes view of the art surface voxelization. Analysis and results of performance tests.

    дипломная работа, добавлен 11.07.2016

  • Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.

    книга, добавлен 04.10.2014

  • Розробка тестової програми. Структура одноциклового SPIM RISC комп’ютера. Верифікація VHDL моделі комп’ютера. Топ-файл VHDL моделі комп’ютера. Модулі керування, виконання операцій, декодування інструкцій, IF та пам’яті. Автоматично згенерований файл.

    курсовая работа, добавлен 30.01.2014

  • The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

    статья, добавлен 08.02.2013

  • Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.

    учебное пособие, добавлен 25.11.2013

  • The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.

    статья, добавлен 23.06.2016

  • Характеристика основной цели программы Classic Shell. Главный анализ дополнительной настройки команды горячих клавиш. Проведение исследования персональных настроек меню Пуск. Особенность удаления и изменения программ. Изучение работы панели инструментов.

    контрольная работа, добавлен 13.05.2020

  • The computer based mechanism which lead to the identification of lines with Romanian chromatic words as the first step in the process of elaboration of a dictionary of poetic meanings of colors. The cooperation of specialists from different fields such.

    статья, добавлен 23.02.2016

  • Алгоритм функционирования модуля ввода-вывода аналоговой информации по шине USB с использованием микросхемы PDIUSBD12 фирмы Philips Semiconductors. Разработка интерфейса и исполнительной части модуля. Листинг программы обработки аналогового сигнала.

    курсовая работа, добавлен 30.11.2013

  • The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.

    статья, добавлен 22.02.2023

  • A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.

    статья, добавлен 20.01.2017

  • The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.

    статья, добавлен 22.12.2016

  • Определение понятия сервиса и сервисно-ориентированной архитектуры (Service-Oriented Architecture). Характеристика основных программных требований к SOA. Роль Web-сервисов, базис их работы. Сущность SOAP — Simple Object Access: ProtocolWSDL, UDDI и WSDL.

    реферат, добавлен 13.10.2014

  • The analysis of algorithms for image representation to recognition of 3D face scans with the presence of facial expressions. The input point cloud based on curvature analysis and range image representation to achieve a representation of the face features.

    статья, добавлен 23.06.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.