Cryptographic hardware and embedded systems
The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
Подобные документы
The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.
??????, добавлен 14.02.2022More sophisticated laser scanning solutions. Uncontrolled movements as breathing, muscle contraction. Special optical systems and mirrors. The result of the scanning process in case a complete surface model of the person. Acquire texture information.
??????, добавлен 22.02.2014Types of groupware: computer-mediated communication, meeting and decisions support systems, shared applications, artefacts. Implementation issues. Cooperative work involves: participants, artefacts. Email and bulletin boards. Structured message systems.
???????????, добавлен 28.12.2013The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
??????, добавлен 01.11.2021Levels of programming support tools. Elements of windowing systems. Possible software architectures. Using toolkits for objects interaction. Paradigms for programming interfaces in applications. Implementation of user interface management systems (UIMS).
???????????, добавлен 28.12.2013The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.
????????? ??????, добавлен 31.10.2016The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.
??????, добавлен 30.07.2016Interaction in agent-oriented systems. Separation of sets of agents into families in accordance with the tasks of the stages of situational management. Development of the model for the integration of behavioral and coordination aspects in agents.
??????, добавлен 28.09.2016The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.
??????, добавлен 06.05.2018The concept and structure of telecommunications, their latest achievements and prospects. Trends in the field of telecommunications, networking model, the interaction of the client and the server. The types of operating systems, external utilities.
??????? ???????, добавлен 11.10.2014Definition of the concept "?ybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.
???????????, добавлен 24.01.2017??????? ?? ????????????? ???????????? ???????. ????? ?????????? ? ??????????? ??????????? ?????????? ? ??????? "software" ? "hardware". ????? ????????????????? ?????????????? ??????????? ? ??????????? ? ?????????????? ?????????? ????????????????.
???????, добавлен 18.11.2013- 113. Navigating the complexity: pseudo-chaotic systems and machine learning scientific research group
Structure and properties of pseudo-chaotic systems. Using machine learning tools for pattern recognition and event prediction. Consideration of ethical issues and assessment of the implications for the synergy of environmental sciences and bioengineering.
??????, добавлен 19.03.2024 Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
?????, добавлен 08.03.2014Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.
??????, добавлен 08.03.2014??????? ?????? ?????????? ????????? Open Conference Systems ?? ?????????? ?????? ??? ??????????? ?? ?????????? ??????????? ???????????. ????????? ????????? ????? ???????????? ????? ??????? ? ???????????? ??????????? ? ???????????? ?? ????????????.
??????, добавлен 27.12.2016- 117. A learning platform for developers of fault-tolerant systems based on the signal-parametric approach
Features a training platform for developers of fault-tolerant engineering systems. Application of the theory of diagnosing ? state of the system and flexible recovery of her health. Support adaptive learning process using Bayesian probabilistic networks.
??????, добавлен 13.01.2017 Random generators for cryptographic applications. Evaluation criteria for the principle design. Multiplication in binary extension fields. Time simulations and spectral algorithms. Limits on the maximum clock frequency of pipelined architectures.
??????? ???????, добавлен 08.03.2014The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.
??????, добавлен 15.09.2012Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.
????????? ???????????, добавлен 08.03.2014Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
??????, добавлен 22.12.2016Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
??????, добавлен 06.05.2018Analysis of existing methods and means of remote work with breadboard Arduino. The advantages of the Tinkercad Internet service in comparison with other tools of remote work. The service capability for microprocessor systems design has been considered.
??????, добавлен 23.07.2023Organizational problems that affect the decision. Socio-technical model and methodology of soft systems. Training users find information. The impact of structure in work. Free search system problems computer. Electronic communication as a critical mass.
??????, добавлен 28.12.2013The technique of drawing up algorithms on elliptic curves, scalar multiplication on Koblitz curves and their effective implementation in reconfigurable devices. The basic architecture and methods for computing scalar multipfication in Hessian form.
??????????, добавлен 08.03.2014
