Besplatna dostava Overseas kurirskom službom iznad 59.99 €
Overseas 4.99 Pošta 4.99 DPD 5.99 GLS 3.99 GLS paketomat 3.49 Box Now 4.49

Besplatna dostava putem Box Now paketomata i Overseas kurirske službe iznad 59,99 €!

Utilizing the Digital Fingerprint Method for Secure Key Generation

Jezik EngleskiEngleski
Knjiga Meki uvez
Knjiga Utilizing the Digital Fingerprint Method for Secure Key Generation Jennifer C Anilao
Libristo kod: 08245254
Nakladnici Biblioscholar, studeni 2012
This research examines a new way to generate an uncloneable secure key by taking advantage of the de... Cijeli opis
? points 150 b
59.77
Vanjske zalihe Šaljemo za 15-20 dana

30 dana za povrat kupljenih proizvoda


Moglo bi vas zanimati i


Fundamentals of EMS, NMS and OSS/BSS Jithesh Sathyan / Tvrdi uvez
common.buy 144.91
American by Choice Henryk Szostak / Tvrdi uvez
common.buy 34.71
Adventures of a Pirate from Savannah J Paulsen Helmken / Meki uvez
common.buy 9.85
Ambient-Marketing Fur Printmedien Christoph Kochhan / Meki uvez
common.buy 55.74
Sand Creek President Kevin (University of New Mexico) Cahill / Meki uvez
common.buy 25.75
Astrology for Life V K Choudhry / Meki uvez
common.buy 21.53
Containment Robert J Teague / Meki uvez
common.buy 59.77
Gambellara. Memorie Storiche Luigi Zanoni / Meki uvez
common.buy 23.34
Unity in Christ? Ken Molloy / Meki uvez
common.buy 27.87
Journals of Major Robert Rogers Robert Rogers / Meki uvez
common.buy 28.37
Heiress and Her Lovers. a Novel. Henrietta Georgiana Marcia Chatterton / Meki uvez
common.buy 25.45

This research examines a new way to generate an uncloneable secure key by taking advantage of the delay characteristics of individual transistors. The user profiles the circuit to deduce the glitch count of each output line for each number of selectable buffers added to the circuit. The user can then use this information to generate a specific glitch count on each output line, which is passed to an encryption algorithm as its key. The results detail tests of two configurations for adding a selectable amount of buffers into each glitch circuit in order to induce additional delay. One configuration adds up to seven buffers that is equivalent to the binary digits used on the three SELECT lines of a multiplexer. The second, referred to as the cascaded design, has eight different quantities of selectable buffers, but they all connect to one multiplexer. Each successive line connects to the previous line and adds a certain number of buffers.

Informacije o knjizi

Puni naziv Utilizing the Digital Fingerprint Method for Secure Key Generation
Jezik Engleski
Uvez Knjiga - Meki uvez
Datum izdanja 2012
Broj stranica 80
EAN 9781288344383
ISBN 9781288344383
Libristo kod 08245254
Nakladnici Biblioscholar
Težina 159
Dimenzije 189 x 246 x 4
Poklonite ovu knjigu još danas
To je jednostavno
1 Dodajte knjigu u košaricu i odaberite isporuku kao poklon 2 Zauzvrat ćemo vam poslati kupon 3 Knjiga dolazi na adresu poklonoprimca

Prijava

Prijavite se na svoj račun. Još nemate Libristo račun? Otvorite ga odmah!

 
obvezno
obvezno

Nemate račun? Ostvarite pogodnosti uz Libristo račun!

Sve ćete imati pod kontrolom uz Libristo račun.

Otvoriti Libristo račun