军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 processor相关记录17条 . 查询时间(0.046 秒)
Accelerated V2X provisioning with Extensible Processor Platform     V2X  SCMS  Curve25519       font style='font-size:12px;'> 2019/9/19
With the burgeoning Vehicle-to-Everything (V2X) communication, security and privacy concerns are paramount. Such concerns are usually mitigated by combining cryptographic mechanisms with suitable key ...
Embedded microprocessors are an important component of reconfigurable architectures. Fine-grain (e.g., cycle-accurate) power analysis of such processors has been used to improve power and energy effic...
Bilinear pairings on elliptic curves are an active research field in cryptography. First cryptographic protocols based on bilinear pairings were proposed by the year 2000 and they are promising soluti...
During the secure boot process for a trusted execution environment, the processor must provide a chain of certificates to the remote client demonstrating that their secure container was established as...
Practical Evaluation of Masking Software Countermeasures on an IoT processor     IoT  masking  side channel attacks       font style='font-size:12px;'> 2017/5/11
Implementing cryptography on Internet-of-Things (IoT) devices, that is resilient against side channel analysis, has so far been a task only suitable for specialist software designers in interaction wi...
Biometric Based Network Security Using MIPS Cryptography Processor     Biometric  Network Security  Cryptograph       font style='font-size:12px;'> 2016/12/10
The empowerment in network on chip (NOC) and System on chip (SOC) in Microelectronics and Sensors have developed the various wireless communication Network technologies. In the past few years, many re...
The Kalray MPPA-256 processor is based on a recent low-energy manycore architecture. In this article, we investigate its performance in multiprecision arithmetic for number-theoretic applications. We ...
Cross Processor Cache Attacks     Invalidate+Transfer  Cross-CPU attack  HyperTransport       font style='font-size:12px;'> 2015/12/21
Multi-processor systems are becoming the de-facto standard across different computing domains, ranging from high-end multi-tenant cloud servers to low-power mobile platforms. The denser integration...
The Niederreiter public-key cryptosystem is based on the security assumption that decoding generic linear binary codes is NP complete, and therefore, is regarded as an alternative post-quantum solu...
We present an efficient implementation of the Optimal Ate Pairing on Barreto-Naehrig curve over a 254-bit prime field on Intel Haswell processor. Our library is able to compute the optimal ate pairing...
Grand Cru, a candidate cipher algorithm of NESSIE project, is based on the strategy of multiple layered security and derived from AES-128.
Grand Cru, a candidate cipher algorithm of NESSIE project, is based on the strategy of multiple layered security and derived from AES-128. This algorithm was not selected for second phase evaluation o...
Cryptographic hash functions are an omnipresent components in security-critical software and devices; they support, for example, digital signature and data authenticity schemes, mechanisms for key der...
We present an efficient implementation of T pairing on Intel Core 2 Duo processor. The processing speed of our implementation achieves 92 sec over F97 3 and 553 sec over F193 3 on 2.6GHz processor...
A Dedicated Processor for the eta Pairing     Dedicated Processor  eta Pairing       font style='font-size:12px;'> 2009/3/5
A Dedicated Processor for the eta Pairing.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...