a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
標(biāo)簽: FPGA-based generator embedded hardware
上傳時間: 2014-01-09
上傳用戶:一諾88
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key
標(biāo)簽: crypthograph information Adleman Rivest
上傳時間: 2017-09-01
上傳用戶:chfanjiang
The OpenMAX DL (Development Layer) APIs contain a comprehensive set of audio, video, signal processing function primitives which can be implemented and optimized on various CPUs and hardware engines and then used for accelerated codec functionality. API functions target key algorithms in such codecs as H.264, MPEG-4, AAC, MP3, and JPEG.
標(biāo)簽: comprehensive Development processi OpenMAX
上傳時間: 2017-09-20
上傳用戶:dancnc
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
標(biāo)簽: Fundamental Limits Secure Class on of
上傳時間: 2020-01-04
上傳用戶:kddlas
第八章 數(shù)字電路技術(shù) A/D,D/A
上傳時間: 2013-07-10
上傳用戶:eeworm
21世紀(jì)大學(xué)新型參考教材系列 集成電路A 荒井
上傳時間: 2013-07-20
上傳用戶:eeworm
積分式A/D轉(zhuǎn)換器其它專用集成電路分冊 清晰書簽版
標(biāo)簽: 積分 D轉(zhuǎn)換 專用集成電路 分
上傳時間: 2013-05-29
上傳用戶:eeworm
OTP 4-位帶SAR8-位A-D轉(zhuǎn)換器單片機(jī)
標(biāo)簽: OTP A-D SAR 轉(zhuǎn)換器
上傳時間: 2013-05-17
上傳用戶:eeworm
單片機(jī)與數(shù)/模(D/A)轉(zhuǎn)換器的接口
標(biāo)簽: 單片機(jī) 模 接口 轉(zhuǎn)換器
上傳時間: 2013-07-12
上傳用戶:eeworm
集成A\D和D\A轉(zhuǎn)換器應(yīng)用技術(shù)
標(biāo)簽: 集成 轉(zhuǎn)換器 應(yīng)用技術(shù)
上傳時間: 2013-07-19
上傳用戶:eeworm
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1