Cryptographic hardware and embedded systems - Курс лекций

бесплатно 0
4.5 43
Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.


Заказать написание новой работы



Дисциплины научных работ



Хотите, перезвоним вам?