Implementing Cryptographic Pairings on Smartcards
The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.
Подобные документы
The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
статья, добавлен 22.02.2023A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.
статья, добавлен 20.01.2017The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
статья, добавлен 22.12.2016- 104. Web-сервисы
Определение понятия сервиса и сервисно-ориентированной архитектуры (Service-Oriented Architecture). Характеристика основных программных требований к SOA. Роль Web-сервисов, базис их работы. Сущность SOAP — Simple Object Access: ProtocolWSDL, UDDI и WSDL.
реферат, добавлен 13.10.2014 - 105. Study of two 3D face representation algorithms using range image and curvature-based representations
The analysis of algorithms for image representation to recognition of 3D face scans with the presence of facial expressions. The input point cloud based on curvature analysis and range image representation to achieve a representation of the face features.
статья, добавлен 23.06.2016 Использование технологии OPC для доступа к данным программируемых логических контроллеров и SCADA-систем. Анализ модели ее безопасности. Структура программного обеспечения. Обновление данных в результате опроса или события. Реализация потенциала OPC UA.
курсовая работа, добавлен 15.09.2017Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.
статья, добавлен 14.07.2016Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.
книга, добавлен 08.03.2014- 109. Шины расширения
Микросхемы динамической памяти. Разъем шины Industry Standard Architecture. Микроканальная архитектура. PCI local bus как основная шина расширения современных компьютеров. AGP как стандарт подключения графических адаптеров. Спецификация плат PCI-Express.
презентация, добавлен 25.06.2013 - 110. CISSP Certification
Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
учебное пособие, добавлен 08.03.2014 Процессорная архитектура SPARC (Scalable Processor Architecture) компании Sun Microsystems как одна из распространенных среди RISC-систем. Характеристики, особенности и составляющие процессора UltraSPARC-1. Суперскалярная производительность процессора.
контрольная работа, добавлен 14.09.2010Development of digital technologies in the protection of applications and information. A comparative analysis of the influence of the choice of the direction of the development of cybersecurity. Recommendations for implementing technology development.
статья, добавлен 09.12.2024Exploring a new open source version of the ReaderBench platform. Calculation of indexes of complexity of texts of various levels according to the Common European scale. Evaluation of the complexity of the perception of the text in various fields.
статья, добавлен 16.08.2023Development of smart contracts based on business rules using natural language processing as an object of research. Development of software components for decentralized systems by building smart contracts from business rules written in natural language.
статья, добавлен 02.10.2024The accuracy and noise immunity of the interpolation method of nonlinear dynamical systems identification based on the Volterra model in the frequency domain. The algorithmic and software toolkit in Matlab is developed for the identification procedure.
статья, добавлен 23.06.2016- 116. Mechanical robots
A mechanical or virtual artificial agentis which guided by a computer program or circuitry. A breed of robots that are designed to increase the utilization by modularizing their architecture. The functionality and effectiveness of a modular robot.
презентация, добавлен 05.12.2015 Разработка архитектуры системы CAD-Architecture, предназначенной для моделирования процессов автоматизированного проектирования и оценки конфигурации САПР. Формирование библиотеки типовых проектных процедур автоматизированного конструирования изделий.
автореферат, добавлен 31.07.2018Improvement of devices containing electronic elements. Application of mechatronic systems in the automotive industry. Using Solidworks software for the design of mobile robot on four or more wheeled chassis. Calculation of stresses of structural parts.
статья, добавлен 13.10.2020Analysis of the model of forced exhalation and Fourier transform. Determination of the frequency spectrum of its air volume velocity. Calculation of the error in measuring the process parameters with a spirometer with characteristics in the range 0-15 Hz.
статья, добавлен 30.01.2017Обзор программного обеспечения для организации дистанционного обучения с помощью технологий TrainingWare Class, Claroline LMS, Learning Activity Management System, Open Architecture Community System и Moodle. Характеристика и выбор оптимальной системы.
статья, добавлен 20.08.2018The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.
книга, добавлен 08.03.2014The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).
статья, добавлен 26.04.2023Concept and prototype for an "assembling" IT intergration portal to be used in higher education. Solution, to use Elgg as an information portal and social media platform. The gap between the closed nature of university IT infrastructure and user-friendly.
статья, добавлен 30.08.2016Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
курс лекций, добавлен 20.10.2016The economic implications and practical applications of Generative Artificial Intelligence various business domains, including marketing, customer support, product design, and data analysis. The recommendations for strategy of implementing GenAI.
статья, добавлен 21.07.2024