Spedizione gratuita con Packeta per un prezzo superiore a 79.99 €
BRT 7.99 Punto BRT 7.99 DHL 7.99 HR Parcel 7.49 GLS 3.99

Utilizing the Digital Fingerprint Method for Secure Key Generation

Lingua IngleseInglese
Libro In brossura
Libro Utilizing the Digital Fingerprint Method for Secure Key Generation Jennifer C Anilao
Codice Libristo: 08245254
Casa editrice Biblioscholar, novembre 2012
This research examines a new way to generate an uncloneable secure key by taking advantage of the de... Descrizione completa
? points 168 b
71.07
Magazzino esterno Inviamo tra 15-20 giorni

30 giorni per il reso


Potrebbe interessarti anche


Fundamentals of EMS, NMS and OSS/BSS Jithesh Sathyan / Rigido
common.buy 171.90
American by Choice Henryk Szostak / Rigido
common.buy 41.20
Adventures of a Pirate from Savannah J Paulsen Helmken / In brossura
common.buy 11.87
Sand Creek President Kevin (University of New Mexico) Cahill / In brossura
common.buy 30.60
Ambient-Marketing Fur Printmedien Christoph Kochhan / In brossura
common.buy 66.14
Astrology for Life V K Choudhry / In brossura
common.buy 25.57
Containment Robert J Teague / In brossura
common.buy 71.07
Wing Design Method for Aerospace Students and Home Builders M. A. Ferman PhD PE / In brossura
common.buy 58.22
Gambellara. Memorie Storiche Luigi Zanoni / In brossura
common.buy 27.82
Unity in Christ? Ken Molloy / In brossura
common.buy 33.07
Journals of Major Robert Rogers Robert Rogers / In brossura
common.buy 33.81
Heiress and Her Lovers. a Novel. Henrietta Georgiana Marcia Chatterton / In brossura
common.buy 30.71

This research examines a new way to generate an uncloneable secure key by taking advantage of the delay characteristics of individual transistors. The user profiles the circuit to deduce the glitch count of each output line for each number of selectable buffers added to the circuit. The user can then use this information to generate a specific glitch count on each output line, which is passed to an encryption algorithm as its key. The results detail tests of two configurations for adding a selectable amount of buffers into each glitch circuit in order to induce additional delay. One configuration adds up to seven buffers that is equivalent to the binary digits used on the three SELECT lines of a multiplexer. The second, referred to as the cascaded design, has eight different quantities of selectable buffers, but they all connect to one multiplexer. Each successive line connects to the previous line and adds a certain number of buffers.

Informazioni sul libro

Titolo completo Utilizing the Digital Fingerprint Method for Secure Key Generation
Lingua Inglese
Rilegatura Libro - In brossura
Data di pubblicazione 2012
Numero di pagine 80
EAN 9781288344383
ISBN 9781288344383
Codice Libristo 08245254
Casa editrice Biblioscholar
Peso 159
Dimensioni 189 x 246 x 4
Regala questo libro oggi stesso
È facile
1 Aggiungi il libro al carrello e scegli la consegna come regalo 2 Ti invieremo subito il buono 3 Il libro arriverà all'indirizzo del destinatario

Accesso

Accedi al tuo account. Non hai ancora un account Libristo? Crealo ora!

 
obbligatorio
obbligatorio

Non hai un account? Ottieni i vantaggi di un account Libristo!

Con un account Libristo, avrai tutto sotto controllo.

Crea un account Libristo