Implementing Cryptographic Pairings on Smartcards

The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.

Подобные документы

  • The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.

    статья, добавлен 22.02.2023

  • A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.

    статья, добавлен 20.01.2017

  • The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.

    статья, добавлен 22.12.2016

  • Определение понятия сервиса и сервисно-ориентированной архитектуры (Service-Oriented Architecture). Характеристика основных программных требований к SOA. Роль Web-сервисов, базис их работы. Сущность SOAP — Simple Object Access: ProtocolWSDL, UDDI и WSDL.

    реферат, добавлен 13.10.2014

  • The analysis of algorithms for image representation to recognition of 3D face scans with the presence of facial expressions. The input point cloud based on curvature analysis and range image representation to achieve a representation of the face features.

    статья, добавлен 23.06.2016

  • Использование технологии OPC для доступа к данным программируемых логических контроллеров и SCADA-систем. Анализ модели ее безопасности. Структура программного обеспечения. Обновление данных в результате опроса или события. Реализация потенциала OPC UA.

    курсовая работа, добавлен 15.09.2017

  • Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.

    статья, добавлен 14.07.2016

  • Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.

    книга, добавлен 08.03.2014

  • Микросхемы динамической памяти. Разъем шины Industry Standard Architecture. Микроканальная архитектура. PCI local bus как основная шина расширения современных компьютеров. AGP как стандарт подключения графических адаптеров. Спецификация плат PCI-Express.

    презентация, добавлен 25.06.2013

  • Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.

    учебное пособие, добавлен 08.03.2014

  • Процессорная архитектура SPARC (Scalable Processor Architecture) компании Sun Microsystems как одна из распространенных среди RISC-систем. Характеристики, особенности и составляющие процессора UltraSPARC-1. Суперскалярная производительность процессора.

    контрольная работа, добавлен 14.09.2010

  • Development of digital technologies in the protection of applications and information. A comparative analysis of the influence of the choice of the direction of the development of cybersecurity. Recommendations for implementing technology development.

    статья, добавлен 09.12.2024

  • Exploring a new open source version of the ReaderBench platform. Calculation of indexes of complexity of texts of various levels according to the Common European scale. Evaluation of the complexity of the perception of the text in various fields.

    статья, добавлен 16.08.2023

  • Development of smart contracts based on business rules using natural language processing as an object of research. Development of software components for decentralized systems by building smart contracts from business rules written in natural language.

    статья, добавлен 02.10.2024

  • The accuracy and noise immunity of the interpolation method of nonlinear dynamical systems identification based on the Volterra model in the frequency domain. The algorithmic and software toolkit in Matlab is developed for the identification procedure.

    статья, добавлен 23.06.2016

  • A mechanical or virtual artificial agentis which guided by a computer program or circuitry. A breed of robots that are designed to increase the utilization by modularizing their architecture. The functionality and effectiveness of a modular robot.

    презентация, добавлен 05.12.2015

  • Разработка архитектуры системы CAD-Architecture, предназначенной для моделирования процессов автоматизированного проектирования и оценки конфигурации САПР. Формирование библиотеки типовых проектных процедур автоматизированного конструирования изделий.

    автореферат, добавлен 31.07.2018

  • Improvement of devices containing electronic elements. Application of mechatronic systems in the automotive industry. Using Solidworks software for the design of mobile robot on four or more wheeled chassis. Calculation of stresses of structural parts.

    статья, добавлен 13.10.2020

  • Analysis of the model of forced exhalation and Fourier transform. Determination of the frequency spectrum of its air volume velocity. Calculation of the error in measuring the process parameters with a spirometer with characteristics in the range 0-15 Hz.

    статья, добавлен 30.01.2017

  • Обзор программного обеспечения для организации дистанционного обучения с помощью технологий TrainingWare Class, Claroline LMS, Learning Activity Management System, Open Architecture Community System и Moodle. Характеристика и выбор оптимальной системы.

    статья, добавлен 20.08.2018

  • The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.

    книга, добавлен 08.03.2014

  • The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).

    статья, добавлен 26.04.2023

  • Concept and prototype for an "assembling" IT intergration portal to be used in higher education. Solution, to use Elgg as an information portal and social media platform. The gap between the closed nature of university IT infrastructure and user-friendly.

    статья, добавлен 30.08.2016

  • Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.

    курс лекций, добавлен 20.10.2016

  • The economic implications and practical applications of Generative Artificial Intelligence various business domains, including marketing, customer support, product design, and data analysis. The recommendations for strategy of implementing GenAI.

    статья, добавлен 21.07.2024

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.