Welcome![Sign In][Sign Up]
Location:
Search - RSA hardware

Search list

[CommunicationRSA_document

Description: RSA算法的硬件实现,这9篇文章详细分析了RSA算法的硬件实现,有做硬件实现RSA算法的是不错的参考资料。-RSA algorithm in hardware, this nine articles detailed analysis of the RSA algorithm in hardware, do a hardware implementation of the RSA algorithm is a good reference.
Platform: | Size: 1288310 | Author: 施向东 | Hits:

[Program docRSA_document

Description: RSA算法的硬件实现,这9篇文章详细分析了RSA算法的硬件实现,有做硬件实现RSA算法的是不错的参考资料。-RSA algorithm in hardware, this nine articles detailed analysis of the RSA algorithm in hardware, do a hardware implementation of the RSA algorithm is a good reference.
Platform: | Size: 1288192 | Author: 施向东 | Hits:

[Crack HackRSA_spadpa_attcaks_and_defenses_design_based_on_80

Description: (繁体中文版)台湾出品不得多得的关于spa dpa 旁道攻击rsa算法的精彩论文。相对国内的一些翻译性质的、粗制滥造的论文,简直是一个天上一个地下。-As information technology has developed rapidly, it provides more convenient life for people. As the result, the security has become the main concern. Recently, user id and password are major methods to protect private information. However, the short password can be broken by hackers. Too long is not easy to memorize. Network traffic-analyzing tool provides the function to gain the user id and password while doing transaction via network. Therefore, low cost Smart Card including user name identification and cryptosystem algorithm has become new trend of modern society. The first object of this thesis is to present the design and implementati- on of a 512-bit RSA cryptosystem by using 8051 microcontroller. In RSA cryptosystem algorithm, modular exponentiation is the essential arithmetic operation. However, 8051 microcontroller does not provide the modular exponentiation. In order to complete RSA cryptosystem, this thesis has mentioned that using L-algorithm to transfer to modular mult
Platform: | Size: 524288 | Author: wang carl | Hits:

[Crack Hackkhalil2006_true_random_number_generator

Description: a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
Platform: | Size: 418816 | Author: Hassan Abdelaziz | Hits:

[Crack Hackdes

Description: 实现了RSA函数的功能,用软件模拟了硬件加密的算法-realize RSA function, which uses software to simulate hardware encrypoto alg.
Platform: | Size: 194560 | Author: JL | Hits:

[AI-NN-PRRSA-Signature-Validate-Crypto

Description: 文章和附件中的代码给用户一个产品用户激活的框架的源代码。包括:RSA算法实现、集成Cypto++环境、产品激活、客户端/服务器命名管道、产生和序列化RSA密码、RSA签名和验证以及产品密钥/序列号生成。 -This article signs the Product Key, which may prove to be too restrictive to the reader. In this case, see Installation IDs Based on Truncated Hashing for an implementation of hardware fingerprints for use with Product Activations.
Platform: | Size: 376832 | Author: 一贯故 | Hits:

[Software Engineeringpkcs-11v2-20d3

Description: 在密码系统中,PKCS#11是公钥加密标准(PKCS, Public-Key Cryptography Standards)中的一份子 ,由RSA实验室(RSA Laboratories)发布[1],它为加密令牌定义了一组平台无关的API ,如硬件安全模块和智能卡。 PKCS#11称为Cyptoki,定义了一套独立于技术的程序设计接口,USBKey安全应用需要实现的接口。 -In cryptography, PKCS# 11 is the Public Key Cryptography Standards (PKCS, Public-Key Cryptography Standards) in part, by RSA Laboratories (RSA Laboratories) release [1], it defines a set of cryptographic token platform independent API, such as hardware security modules and smart cards. PKCS# 11 is called Cyptoki, defines a set of technology-independent programming interfaces, USBKey security applications need to implement an interface.
Platform: | Size: 306176 | Author: xiadaga | Hits:

CodeBus www.codebus.net