Cryptographic hardware

Autor:

Source: Wikipedia. Pages: 79. Chapters: BID/60, Combined Cipher Machine, Creed & Company, Cryptex, Cryptographic accelerator, Crypto phone, CYPRIS (microchip), EFF DES cracker, Enigma machine, Fialka, Fish (cryptography), Hardware security module, Hebern... Viac o knihe

Produkt je dočasne nedostupný

21.38 €

bežná cena: 24.30 €

O knihe

Source: Wikipedia. Pages: 79. Chapters: BID/60, Combined Cipher Machine, Creed & Company, Cryptex, Cryptographic accelerator, Crypto phone, CYPRIS (microchip), EFF DES cracker, Enigma machine, Fialka, Fish (cryptography), Hardware security module, Hebern rotor machine, Hengzhi chip, IBM 4758, IBM 4764, KG-13, Lacida, Lorenz cipher, Mercury (cipher machine), NEMA (machine), Noreen, OMI cryptograph, Pinwheel (cryptography), Plugboard, Pockels effect, Portex, Rambutan (cryptography), Secure cryptoprocessor, Secure telephone, Siemens and Halske T52, SIGABA, SIGCUM, SSL acceleration, Subscriber identity module, Tamper-resistant security module, Trusted Platform Module, Typex. Excerpt: 176 article summaries including: Migration virtual trusted platform module state using TPM emulator . Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study . Wikibooks: Cryptography/Enigma machine . Enigma machine applet . Cryptographic Hardware and Embedded Systems -- CHES 2010 . Efficient Padding Oracle Attacks on Cryptographic Hardware . Uniformly-Switching Logic for Cryptographic Hardware . Data Protection and Risk Management on Personal Computer Systems Using the Trusted Platform Module; Datenschutz und Risikomanagement auf Personal-Computer Systemen unter . Encryption and the Enigma Machine . 14 Reversible Logic to Cryptographic Hardware: A New Paradigm . 09282 Abstracts Collection -- Foundations for Forgery-Resilient Cryptographic Hardware . 09282 Executive Summary -- Foundations for Forgery-Resilient Cryptographic Hardware . Secure Testable S-box Architecture for Cryptographic Hardware Implementation . Security evaluation at design time for cryptographic hardware . Pockels effect in thermally poled silica optical fibres . Development of an optical pulsing by using pockels effect . Destructive and constructive aspects of efficient algorithms and implementation of cryptographic hardware . ATHENa - Automated Tool for Hardware EvaluatioN: Software Environment for Fair and Comprehensive Performance Evaluation of Cryptographic Hardware using FPGAs . 31 Spin-to-orbital momentum conversion via electrooptic Pockels effect in crystals . 32 On widening the angular existence domain for Dyakonov surface waves using the Pockels effect . An Optical AC Voltage Sensor Based on the Transverse Pockels Effect . Measuring low amplitude periodical phase shift without set-up stabilization: application to Pockels effect characterization . Fast switching of light propagation in a photorefractive crystal via Pockels effect . An Optical AC Voltage Sensor Based on the Transverse Pockels Effect . Pockels effect of water in the electric double layer at the interface between water and transparent electrode . Investigation of the internal electric field distribution under in situ x-ray irradiation and under low temperature conditions by the means of the Pockels effect . NCipher(nFast/CA cryptographic accelerator)(Product Announcement)(Brief Article). In Brief: DLJdirect Buys Cryptographic Accelerator. New hardware security module available from nCipher(Brief Article). Thales Releases nShield Connect 6000 Hardware Security Module. Thales Brings Out nShield Edge Hardware Security Module. ERACOM ANNOUNCES ENTRY LEVEL HARDWARE SECURITY MODULE FOR PAYMENT SYSTEMS(Eracomprotectserver orange eft)(Product Announcement). Enigma Machine. Protegrity SecureData F3 with nCipher FIPS 140 validated hardware now available for Microsoft SQL Server 2000. Microcontro...

  • Vydavateľstvo: Books LLC, Reference Series
  • Formát: Paperback
  • Jazyk:
  • ISBN: 9781156433218

Generuje redakčný systém BUXUS CMS spoločnosti ui42.