Cryptographic reahzations in software
The technique of drawing up algorithms on elliptic curves, scalar multiplication on Koblitz curves and their effective implementation in reconfigurable devices. The basic architecture and methods for computing scalar multipfication in Hessian form.
Подобные документы
??????? ????????? ? ??????? ???????? ??????????. Visual Basic - ????? ?????????? ?????????? ?????????? ????????. ???????? ? ???????????? ?????? ? ??????? ?????? ? Visual Basic. ???????????????? ?? ??????? ??????? ???. ???????? Web-??????? ? ???? ??????.
?????, добавлен 06.05.2011???????? ???????? ????????? ? ??????????? ????? Visual Basic. ?????????????? ??????? ? ???????? ??????? ?????, ????????? ? ????? ?????????. ?????? ??????? ??? ????????????? ??????????? ????????????? ?????? ?? ???????????????? ?? ????? Visual Basic.
??????? ???????, добавлен 15.04.2016The phenomenon of virtual reality, as a tool of achieving interactive behavior in architecture and built environment. Various possibilities for improving the quality of environment and space, both real and existing only within alternative perception.
??????, добавлен 30.07.2018Improvement of devices containing electronic elements. Application of mechatronic systems in the automotive industry. Using Solidworks software for the design of mobile robot on four or more wheeled chassis. Calculation of stresses of structural parts.
??????, добавлен 13.10.2020Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.
??????? ??????, добавлен 15.09.2012Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
???????, добавлен 31.10.2012Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
?????, добавлен 08.03.2014???? ???????????????? Visual Basic, ??? ?????????????? ? ? ??????????? ?????? ? ????? Windows. ??????????? ????????? ????????? ? ????? Visual Basic ??? ?????????? ?????????????? ????????? ? ???????? ?????????. ??????????? ???????? ??????????????.
??????????? ??????, добавлен 10.01.2016The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
???????, добавлен 20.03.2016This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.
?????, добавлен 25.11.2013The regression models of software project duration based on project effort. Equations of confidence interval of a non-linear regression model of software project duration based on Johnson transformation for the personal computer development platform.
??????, добавлен 22.03.2016Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
??????, добавлен 29.01.2016?????????? ???-?????? (High Performance Computing). ??????????? ??????? ??????????? ???????????????? ?????? ? ????? ????? ??????, ???????? ???????????????? ?????. ??????????? ????????????? ??????? ?????????? ??????. ???????? ???????? ??????????.
??????, добавлен 14.09.2016??????? ?? ????????????? ???????????? ???????. ????? ?????????? ? ??????????? ??????????? ?????????? ? ??????? "software" ? "hardware". ????? ????????????????? ?????????????? ??????????? ? ??????????? ? ?????????????? ?????????? ????????????????.
???????, добавлен 18.11.2013Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.
?????, добавлен 08.03.2014???????? ? ?????????????? ???????????? ????? Visual Basic, ??? ???????????? ? ??????????. ??????? ???????????????? ??? ?????????? ???????? Visual Basic for Applications, ????????? ? ??????? ??????? ????? ????????????????. ?????????? ???????? ? MS Excel.
???????? ??????, добавлен 02.12.2011???????? ????? ?????? ? ??????????, ??????, ??????? ??????????, ??????????????. Visual Basic ??? ????????-??????????????? ??????? ????????????????, ??????? ??????????? ??????????????? ??? ?????????? ??????? ??????????? ?????????? ? ??????????????.
?????????, добавлен 05.07.2010Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.
??????, добавлен 26.01.2021The dimension reduction as a way to overcome the errors of the measurement when dealing with vector data in high-dimensional spaces and as a modelling tool of map. A techniques for dimension. The implementation of neural's networks for these techniques.
??????? ??????, добавлен 08.02.2013The application of artificial intelligence in wind turbines opens up new prospects for optimizing operation, increasing efficiency and improving control. The examples given demonstrate how various machine learning methods, optimization algorithms.
??????, добавлен 24.02.2025A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.
??????, добавлен 15.09.2012- 122. Models of the system
Standard Formalisms - software engineering notations used to specify the required behaviour of specific interactive systems. Types of system model: dialogue, full state definition, abstract interaction. Computers are inherently mathematical machines.
???????????, добавлен 28.12.2013 ???????? ?????????? ????-????? ????????? ????????? ? ????? ???????????????? Basic, ??????????? ?? ?????? ????? ??????????????? ???????? ?????????. ??????? ?????????? ??????? ?????? ??? ???????????? ???????? ? ??????????? ???????? y ??? ???????? ?.
???????????? ??????, добавлен 12.11.2009- 124. Choosing a printer
Learn the basic requirements when choosing a printer: manufacturer, print speed and quality, comfort of use. Types of home printers, their advantages and disadvantages. The principle of operation of multi-function devices, inkjet and laser printers.
???????????, добавлен 07.03.2018 The advantages of remote access to the information resources of the State treasury service of Ukraine with the aim of automating the process of executing budgets. The implementation of the software and technical complex "Treasury client - Treasury".
??????, добавлен 25.06.2024