Cryptographic reahzations in software

The technique of drawing up algorithms on elliptic curves, scalar multiplication on Koblitz curves and their effective implementation in reconfigurable devices. The basic architecture and methods for computing scalar multipfication in Hessian form.

Подобные документы

  • ??????? ????????? ? ??????? ???????? ??????????. Visual Basic - ????? ?????????? ?????????? ?????????? ????????. ???????? ? ???????????? ?????? ? ??????? ?????? ? Visual Basic. ???????????????? ?? ??????? ??????? ???. ???????? Web-??????? ? ???? ??????.

    ?????, добавлен 06.05.2011

  • ???????? ???????? ????????? ? ??????????? ????? Visual Basic. ?????????????? ??????? ? ???????? ??????? ?????, ????????? ? ????? ?????????. ?????? ??????? ??? ????????????? ??????????? ????????????? ?????? ?? ???????????????? ?? ????? Visual Basic.

    ??????? ???????, добавлен 15.04.2016

  • The phenomenon of virtual reality, as a tool of achieving interactive behavior in architecture and built environment. Various possibilities for improving the quality of environment and space, both real and existing only within alternative perception.

    ??????, добавлен 30.07.2018

  • Improvement of devices containing electronic elements. Application of mechatronic systems in the automotive industry. Using Solidworks software for the design of mobile robot on four or more wheeled chassis. Calculation of stresses of structural parts.

    ??????, добавлен 13.10.2020

  • Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.

    ??????? ??????, добавлен 15.09.2012

  • Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.

    ???????, добавлен 31.10.2012

  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    ?????, добавлен 08.03.2014

  • ???? ???????????????? Visual Basic, ??? ?????????????? ? ? ??????????? ?????? ? ????? Windows. ??????????? ????????? ????????? ? ????? Visual Basic ??? ?????????? ?????????????? ????????? ? ???????? ?????????. ??????????? ???????? ??????????????.

    ??????????? ??????, добавлен 10.01.2016

  • The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.

    ???????, добавлен 20.03.2016

  • This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.

    ?????, добавлен 25.11.2013

  • The regression models of software project duration based on project effort. Equations of confidence interval of a non-linear regression model of software project duration based on Johnson transformation for the personal computer development platform.

    ??????, добавлен 22.03.2016

  • Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.

    ??????, добавлен 29.01.2016

  • ?????????? ???-?????? (High Performance Computing). ??????????? ??????? ??????????? ???????????????? ?????? ? ????? ????? ??????, ???????? ???????????????? ?????. ??????????? ????????????? ??????? ?????????? ??????. ???????? ???????? ??????????.

    ??????, добавлен 14.09.2016

  • ??????? ?? ????????????? ???????????? ???????. ????? ?????????? ? ??????????? ??????????? ?????????? ? ??????? "software" ? "hardware". ????? ????????????????? ?????????????? ??????????? ? ??????????? ? ?????????????? ?????????? ????????????????.

    ???????, добавлен 18.11.2013

  • Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.

    ?????, добавлен 08.03.2014

  • ???????? ? ?????????????? ???????????? ????? Visual Basic, ??? ???????????? ? ??????????. ??????? ???????????????? ??? ?????????? ???????? Visual Basic for Applications, ????????? ? ??????? ??????? ????? ????????????????. ?????????? ???????? ? MS Excel.

    ???????? ??????, добавлен 02.12.2011

  • ???????? ????? ?????? ? ??????????, ??????, ??????? ??????????, ??????????????. Visual Basic ??? ????????-??????????????? ??????? ????????????????, ??????? ??????????? ??????????????? ??? ?????????? ??????? ??????????? ?????????? ? ??????????????.

    ?????????, добавлен 05.07.2010

  • Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.

    ??????, добавлен 26.01.2021

  • The dimension reduction as a way to overcome the errors of the measurement when dealing with vector data in high-dimensional spaces and as a modelling tool of map. A techniques for dimension. The implementation of neural's networks for these techniques.

    ??????? ??????, добавлен 08.02.2013

  • The application of artificial intelligence in wind turbines opens up new prospects for optimizing operation, increasing efficiency and improving control. The examples given demonstrate how various machine learning methods, optimization algorithms.

    ??????, добавлен 24.02.2025

  • A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.

    ??????, добавлен 15.09.2012

  • Standard Formalisms - software engineering notations used to specify the required behaviour of specific interactive systems. Types of system model: dialogue, full state definition, abstract interaction. Computers are inherently mathematical machines.

    ???????????, добавлен 28.12.2013

  • ???????? ?????????? ????-????? ????????? ????????? ? ????? ???????????????? Basic, ??????????? ?? ?????? ????? ??????????????? ???????? ?????????. ??????? ?????????? ??????? ?????? ??? ???????????? ???????? ? ??????????? ???????? y ??? ???????? ?.

    ???????????? ??????, добавлен 12.11.2009

  • Learn the basic requirements when choosing a printer: manufacturer, print speed and quality, comfort of use. Types of home printers, their advantages and disadvantages. The principle of operation of multi-function devices, inkjet and laser printers.

    ???????????, добавлен 07.03.2018

  • The advantages of remote access to the information resources of the State treasury service of Ukraine with the aim of automating the process of executing budgets. The implementation of the software and technical complex "Treasury client - Treasury".

    ??????, добавлен 25.06.2024

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.