Cryptographic hardware and embedded systems

Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.

Подобные документы

  • Сomputer facilities and microprocessor systems, data manipulation. The general principles of programming. The branched and cyclic programs organization using Assembler-86 language. X-bit Motorola microprocessors. Communication networks designing.

    методичка, добавлен 11.10.2014

  • The software which automates the process of air-traffic situations generation. The set includes: airspace sector editor, dynamic situation generator. Reducing the generation time and increasing the quantities of practical tasks due to automation.

    статья, добавлен 27.06.2016

  • Methods, tools and applications of Data Mining. Basic concepts of data warehouses and the place of Data Mining in their architecture. The process of data analysis using this technology, its stages. Analytical software market, product data capabilities.

    статья, добавлен 30.10.2020

  • Essentially create and manufacture complex and unique prototypes with increased speed and versatility using 3D modeling. Using machine learning and generative design to improve the accuracy of 3D models, leading to increased manufacturing efficiency.

    статья, добавлен 20.07.2024

  • The importance of forecasting electricity consumption to improve its efficiency and increase the competitiveness of manufactured products by reducing the share of costs. Development of software to solve this problem, its functions and differences.

    статья, добавлен 27.02.2023

  • The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.

    статья, добавлен 09.04.2022

  • The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.

    статья, добавлен 23.10.2020

  • Basic Notions of Systems and Signals. State-space Models. Process Modeling for Control Purposes. Input–output Models and Realization Theory. Controllability and Observability of LTI Systems. Stability and The Lyapunov Method. State Feedback Controllers.

    учебное пособие, добавлен 25.11.2013

  • Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.

    статья, добавлен 29.07.2016

  • Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.

    статья, добавлен 14.01.2017

  • Features a training platform for developers of fault-tolerant engineering systems. Application of the theory of diagnosing а state of the system and flexible recovery of her health. Support adaptive learning process using Bayesian probabilistic networks.

    статья, добавлен 13.01.2017

  • Современные методы и средства проектирования информационных систем, основанные на использовании CASE-технологии (Computer Aided Software/System Engineering), их общая характеристика и классификация. Описание программных продуктов Computer Associates.

    реферат, добавлен 24.10.2009

  • Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.

    книга, добавлен 08.03.2014

  • Development of software and algorithm of the information system for monitoring fires. Possibilities detecting fire from sensor, predicting its spread and assessing the source of ignition. Realization of information through sound and visual signals.

    статья, добавлен 22.12.2016

  • Researching network attacks, security audit tools. Securing the router for administrative Access. Configuring a site-to-site VPN using cisco IOS and SDM. Configuring a remote Access VPN server and client. Security policy development and implementation.

    учебное пособие, добавлен 08.03.2014

  • Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.

    статья, добавлен 28.02.2016

  • Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.

    учебное пособие, добавлен 08.03.2014

  • Cyberspace as a medium through which people engage in more complex processes. The history and development of information security principles in the World Wide Web, an assessment of their effectiveness in practice, the prospects for further development.

    реферат, добавлен 24.03.2015

  • Study the ways in which computer systems or network devices connect to each other. Possibilities of using network topology. Features and issues of bus topology, star topology, ring topology, mesh topology, tree topology, daisy chain and hybrid topology.

    реферат, добавлен 11.10.2017

  • Analysis of global trends and practices of Agile manifesto software development. Cultivation of agile-oriented thinking and implementation of frameworks. Maintaining a balance between the technical aspects of the project and customer-related efforts.

    статья, добавлен 21.07.2024

  • Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.

    книга, добавлен 08.03.2014

  • Research of aspects of information protection procedure development on the basis of software development. Characteristics of the Raspberry PI platform and the Raspbian system. Possibilities of influence of third-party means on management of object.

    статья, добавлен 29.10.2020

  • Learning English for working with the computer and other information technology. Working with computer programs, discussion of problems and project planning. Use for intermediate level students and above. Using software: useful verbs, the control panel.

    учебное пособие, добавлен 28.05.2015

  • Характеристика различных способов восстановление реестра. Понятие и функции реестра Windows (системного реестра). Файлы реестра и место их хранения: Default, Sam, Security, Software, System. Выполнение работы. Программа ERUNT. Создание бекапа реестра.

    практическая работа, добавлен 10.05.2015

  • Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.

    книга, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.