Cryptographic hardware and embedded systems

Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.

Подобные документы

  • The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.

    ??????? ???????, добавлен 15.09.2012

  • Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.

    ?????, добавлен 15.09.2012

  • Development of smart contracts based on business rules using natural language processing as an object of research. Development of software components for decentralized systems by building smart contracts from business rules written in natural language.

    ??????, добавлен 02.10.2024

  • Methodic of programming and ways of using of object oriented programming software Microsoft Excel Visual Basic for Applications for laboratory workshops of students in studies of computer modeling courses. Consequences for numerical simulation.

    ??????, добавлен 01.10.2014

  • History of game technology, from simple pixel games to modern digital. The development of games and software video games from the point of view of the programmer. Experts participating in the development of games. Classification types of popular games.

    ???????? ??????, добавлен 07.03.2016

  • Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.

    ??????, добавлен 08.08.2021

  • Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.

    ??????, добавлен 27.05.2021

  • Universal design principles. Peculiarities of using multi-sensory systems. Applying speech, non-speech, sound, touch, handwriting and gestures in multi-modal systems. Recognition problems in interactive computer systems. Personal orientation of design.

    ???????????, добавлен 28.12.2013

  • The regression models of software project duration based on project effort. Equations of confidence interval of a non-linear regression model of software project duration based on Johnson transformation for the personal computer development platform.

    ??????, добавлен 22.03.2016

  • Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.

    ???? ??????, добавлен 08.03.2014

  • Major machine translation methods designed to speed up the process of multilingual text translation by using a computer software. Analysis of the performance of rule-based machine translation, statistical models, hybrid and neural machine translation.

    ??????, добавлен 16.08.2022

  • ????????? ? ??????? ????????? ??????????? ? ?????????????? ?? ??????????? ?????????. ??????????????, ????????? ???????????? ??? ????? ?????????? ????? ?????????????? ??????. ????????? ???????? ??? ERwin, S-Designor, Computer-aided software engineering.

    ????????? ??????, добавлен 19.12.2016

  • The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.

    ???????, добавлен 20.03.2016

  • Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.

    ?????, добавлен 08.03.2014

  • The use of mobile smart tools - a factor that contributes to the introduction of the remote control method and smooth adjustment of key parameters of the diagnostic process. Components of a software package for determining a person's visual fatigue.

    ??????, добавлен 21.12.2021

  • The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.

    ??????, добавлен 24.10.2018

  • Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.

    ??????, добавлен 06.05.2018

  • ??????? ??????????????? ????????????? ???????? ?? ??????? ?? ???????? ??? ???????????. ?????????? ?????????? ???????? ???????????? ?????? ?? ?????? ? ?????????. ????????????? computer-aided software engineering ??????? ?????????? ?????????????? ???????.

    ????????? ??????, добавлен 18.05.2017

  • Features and functions widget bits. Link to the base program. The structure of the appearance, inclusion of the words: verbs, adjectives, nouns. Software tools for application development, identifying a user. A inactive variants of dynamic interaction.

    ??????, добавлен 28.12.2013

  • Choice relationship database system, a cloud platform and a software platform for implementing and deploying the relational database system, resource and service agents; software module market risk. User interface for outputting the received information.

    ???????? ??????, добавлен 12.08.2018

  • Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.

    ??????????? ??????, добавлен 14.05.2017

  • The prerequisites for the emergence and formation of areas of computer science that explores the possibilities of electronic encryption devices using large-scale integrated computer circuits. The structure of cryptographic techniques to explore data.

    ?????, добавлен 08.03.2014

  • The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.

    ??????, добавлен 01.11.2021

  • This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.

    ?????, добавлен 08.03.2014

  • The neural software in medicine to investigate and diagnose immune deficiencies; diagnose and study allergic and pseudoallergic reactions; forecast emergence or aggravation of stagnant cardiac insufficiency in patients with cardiac rhythm disorders.

    ??????, добавлен 08.02.2013

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.