Search found 86 matches
- Mon May 14, 2018 5:50 am
- Forum: Questions & Answers
- Topic: mature product with biometric api powered by java card
- Replies: 1
- Views: 5875
Re: mature product with biometric api powered by java card
fingerprint technology ? I think those apis are defined by companies itself.
- Wed Apr 18, 2018 6:22 am
- Forum: Questions & Answers
- Topic: How to verify that the RSA calculation process is under attack
- Replies: 5
- Views: 8745
How to verify that the RSA calculation process is under attack
Hello everyone
I have a problem with RSA on javacard. How to verify that the RSA calculation process is under attack ?
Again RSA ? Does anyone have a better way?
I have a problem with RSA on javacard. How to verify that the RSA calculation process is under attack ?
Again RSA ? Does anyone have a better way?
- Wed Apr 18, 2018 5:57 am
- Forum: Questions & Answers
- Topic: Multiply big numbers
- Replies: 8
- Views: 15426
Re: Multiply big numbers
It's like private APIs defined by the company. Is big-end or little-end ?
- Fri Jan 19, 2018 1:47 am
- Forum: Algorithm School
- Topic: How to compute MAC
- Replies: 13
- Views: 51261
Re: How to compute MAC
According to GPC_Specification_v2.2.1, the ICV should be the MAC of the EXTERNAL AUTHENTICATE command. The description from GPC_Specification_v2.2.1 is : E.3.2 Message Integrity ICV using Explicit Secure Channel Initiation When using explicit Secure Channel initiation, SCP02 mandates the use of a MA...
- Tue Apr 19, 2016 5:51 am
- Forum: Other Tools
- Topic: I want a tool to get bytecode speed time
- Replies: 4
- Views: 18432
I want a tool to get bytecode speed time
hello,
I want a tool to get bytecode speed time oncard. Could you help me?
I want a tool to get bytecode speed time oncard. Could you help me?
- Tue Apr 19, 2016 5:49 am
- Forum: Communication
- Topic: How anderstance SFGT?
- Replies: 1
- Views: 8460
How anderstance SFGT?
hello,
I 'm in a puzzle about the SFGT.
In 14443, what role the SFGT acts ?
I 'm in a puzzle about the SFGT.
In 14443, what role the SFGT acts ?
- Tue Apr 19, 2016 1:35 am
- Forum: Communication
- Topic: How to implement T=CL protocol
- Replies: 4
- Views: 26751
Re: How to implement T=CL protocol
T=CL is block protocol, T= 1 is block protocol too. So, they are similar. You could referce to your T1 protocol implementation.
- Sun Dec 06, 2015 9:49 pm
- Forum: Algorithm School
- Topic: how compute Phi(N) of RSA?
- Replies: 2
- Views: 6945
Re: how compute Phi(N) of RSA?
Hello,
Thank you very much.
I solved the problem following your method.
Thank you very much.
I solved the problem following your method.
- Tue Nov 24, 2015 9:35 pm
- Forum: Algorithm School
- Topic: how compute Phi(N) of RSA?
- Replies: 2
- Views: 6945
how compute Phi(N) of RSA?
hello, I have a problem about RSA. Please help me!
IN RSA,
N=P*Q
Phi(N) = (P-1)*(Q-1)
When compute standard RSA, a necessary condition is D<Phi(N).
Phi(N) = (P-1)*(Q-1) = P*Q - (P+Q) + 1
according N = P*Q, P + Q ≈ 2*(N^½)
Phi(N) = N - 2*(N^½) + 1
The problem is how to compute N^½
IN RSA,
N=P*Q
Phi(N) = (P-1)*(Q-1)
When compute standard RSA, a necessary condition is D<Phi(N).
Phi(N) = (P-1)*(Q-1) = P*Q - (P+Q) + 1
according N = P*Q, P + Q ≈ 2*(N^½)
Phi(N) = N - 2*(N^½) + 1
The problem is how to compute N^½
- Tue Nov 24, 2015 9:28 pm
- Forum: Algorithm School
- Topic: Error sw 6F00 when using ECDSA to implement the signing code
- Replies: 1
- Views: 6630
Re: Error sw 6F00 when using ECDSA to implement the signing code
your construction function is private.....