a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
标签: FPGA-based generator embedded hardware
上传时间: 2014-01-09
上传用户:一诺88
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key
标签: crypthograph information Adleman Rivest
上传时间: 2017-09-01
上传用户:chfanjiang
The OpenMAX DL (Development Layer) APIs contain a comprehensive set of audio, video, signal processing function primitives which can be implemented and optimized on various CPUs and hardware engines and then used for accelerated codec functionality. API functions target key algorithms in such codecs as H.264, MPEG-4, AAC, MP3, and JPEG.
标签: comprehensive Development processi OpenMAX
上传时间: 2017-09-20
上传用户:dancnc
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
标签: Fundamental Limits Secure Class on of
上传时间: 2020-01-04
上传用户:kddlas
第八章 数字电路技术 A/D,D/A
上传时间: 2013-07-10
上传用户:eeworm
21世纪大学新型参考教材系列 集成电路A 荒井
上传时间: 2013-07-20
上传用户:eeworm
积分式A/D转换器其它专用集成电路分册 清晰书签版
上传时间: 2013-05-29
上传用户:eeworm
OTP 4-位带SAR8-位A-D转换器单片机
上传时间: 2013-05-17
上传用户:eeworm
单片机与数/模(D/A)转换器的接口
上传时间: 2013-07-12
上传用户:eeworm
集成A\D和D\A转换器应用技术
上传时间: 2013-07-19
上传用户:eeworm