{"id":130142,"date":"2018-02-14T16:03:24","date_gmt":"2018-02-14T16:03:24","guid":{"rendered":"https:\/\/\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/"},"modified":"2018-02-14T16:03:24","modified_gmt":"2018-02-14T16:03:24","slug":"puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/","title":{"rendered":"Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide"},"content":{"rendered":"<p><span id=\"result_box\" lang=\"fr\"><span title=\"Given that premise, MIT researchers have built a dedicated chip hardwired to perform public-key encryption at only 1\/400th the power that equivalent software execution would require, while using only a tenth of the memory and running 500 times faster.\n\n\">Compte tenu de ces pr\u00e9requis, les chercheurs du MIT ont construit une puce d\u00e9di\u00e9e c\u00e2bl\u00e9e pour effectuer le cryptage \u00e0 cl\u00e9 publique utilisant seulement 1 \/ 400e de la puissance que l&rsquo;ex\u00e9cution logicielle \u00e9quivalente n\u00e9cessiterait, tout en n&rsquo;utilisant q&rsquo;un dixi\u00e8me de la m\u00e9moire et en \u00e9tant 500 fois plus rapide.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"The chip described in a paper presented at the International Solid-State Circuits Conference has been designed to be able to handle any type of elliptic-curve encryption.\n\n\">La puce d\u00e9crite dans un document pr\u00e9sent\u00e9 \u00e0 la Conf\u00e9rence internationale sur les circuits \u00e0 semi-conducteurs SSCC a \u00e9t\u00e9 con\u00e7ue pour pouvoir traiter tout type de cryptage \u00e0 courbe elliptique.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"\u201cCryptographers are coming up with curves with different properties, and they use different primes,\u201d explains Utsav Banerjee, an MIT graduate student in electrical engineering and computer science and first author on the paper.\n\n\">\u00abLes cryptographes proposent des courbes aux propri\u00e9t\u00e9s diff\u00e9rentes et utilisent des nombres premiers diff\u00e9rents\u00bb, explique Utsav Banerjee, \u00e9tudiant dipl\u00f4m\u00e9 du MIT en g\u00e9nie \u00e9lectrique et informatique et premier auteur de ctte pr\u00e9sentation.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"\u201cThere is a lot of debate regarding which curve is secure and which curve to use, and there are multiple governments with different standards coming up that talk about different curves.\">\u00ab\u00a0Il y a beaucoup de d\u00e9bats sur la s\u00e9curit\u00e9 de la courbe et quelle courbe utiliser, et il y a de multiples gouvernements avec des normes diff\u00e9rentes qui parlent de diff\u00e9rentes courbes. <\/span><span title=\"With this chip, we can support all of them, and hopefully, when new curves come along in the future, we can support them as well.\u201d\n\n\">Avec cette puce, nous pouvons les supporter tous, et avec un peu de chance, lorsque de nouvelles courbes appara\u00eetront dans le futur, nous pouvons \u00e9galement les supporter. \u00ab\u00a0<\/span><\/p>\n<p><span title=\"To create their general-purpose elliptic-curve chip, the researchers decomposed the cryptographic computation into its constituent parts.\">Pour cr\u00e9er leur puce \u00e0 courbe elliptique \u00e0 usage g\u00e9n\u00e9ral, les chercheurs ont d\u00e9compos\u00e9 le calcul cryptographique en ses parties constituantes. <\/span><span title=\"Elliptic-curve cryptography relies on modular arithmetic, meaning that the values of the numbers that figure into the computation are assigned a limit.\">La cryptographie \u00e0 courbe elliptique repose sur l&rsquo;arithm\u00e9tique modulaire, ce qui signifie que les valeurs des nombres qui figurent dans le calcul sont affect\u00e9es d&rsquo;une limite. <\/span><span title=\"If the result of some calculation exceeds that limit, it\u2019s divided by the limit, and only the remainder is preserved.\">Si le r\u00e9sultat d&rsquo;un calcul d\u00e9passe cette limite, il est divis\u00e9 par la limite, et seul le reste est conserv\u00e9. <\/span><span title=\"The secrecy of the limit helps ensure cryptographic security.\n\n\">Le secret de la limite permet d&rsquo;assurer la s\u00e9curit\u00e9 cryptographique.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"One of the computations to which the MIT chip devotes a special-purpose circuit is thus modular multiplication.\">L&rsquo;un des calculs auxquels la puce du MIT consacre un circuit sp\u00e9cifique est donc la multiplication modulaire. <\/span><span title=\"But because elliptic-curve cryptography deals with large numbers, the chip\u2019s modular multiplier is massive.\">Mais, comme la cryptographie \u00e0 courbe elliptique traite de grands nombres, le multiplicateur modulaire de la puce est \u00e9norme. <\/span><span title=\"Typically, a modular multiplier might be able to handle numbers with 16 or maybe 32 bits.\">Typiquement, un multiplicateur modulaire pourrait \u00eatre capable de g\u00e9rer des nombres avec 16 ou peut-\u00eatre 32 bits. <\/span><span title=\"For larger computations, the results of discrete 16- or 32-bit multiplications would be integrated by additional logic circuits.\">Pour des calculs plus importants, les r\u00e9sultats des multiplications discr\u00e8tes de 16 ou 32 bits seraient int\u00e9gr\u00e9s par des circuits logiques suppl\u00e9mentaires. <\/span><span title=\"The MIT chip\u2019s modular multiplier can handle 256-bit numbers, eliminating the extra circuitry for integrating smaller computations and reducing the chip\u2019s energy consumption while increasing its speed.\n\n\">Le multiplicateur modulaire de la puce MIT peut g\u00e9rer des nombres de 256 bits, \u00e9liminant les circuits suppl\u00e9mentaires pour l&rsquo;int\u00e9gration de calculs plus petits et r\u00e9duisant la consommation d&rsquo;\u00e9nergie de la puce tout en augmentant sa vitesse.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"Another key operation in elliptic-curve cryptography is called inversion.\">Une autre op\u00e9ration cl\u00e9 dans la cryptographie \u00e0 courbe elliptique est appel\u00e9e inversion. <\/span><span title=\"Inversion is the calculation of a number that, when multiplied by a given number, will yield a modular product of 1. In previous chips dedicated to elliptic-curve cryptography, inversions were performed by the same circuits that did the modular multiplications, saving chip space\">L&rsquo;inversion est le calcul d&rsquo;un nombre qui, multipli\u00e9 par un nombre donn\u00e9, donnera un produit modulaire de 1. Dans les puces pr\u00e9c\u00e9dentes d\u00e9di\u00e9es \u00e0 la cryptographie \u00e0 courbe elliptique, les inversions \u00e9taient effectu\u00e9es par les m\u00eames circuits que les multiplications modulaires, \u00e9conomisant de l&rsquo;espace sur la puce <\/span><span title=\".\">. <\/span><span title=\"But the MIT researchers instead equipped their chip with a special-purpose inverter circuit.\">Mais les chercheurs du MIT ont plut\u00f4t \u00e9quip\u00e9 leur puce d&rsquo;un circuit inverseur sp\u00e9cial. <\/span><span title=\"This increases the chip\u2019s surface area by 10 percent, but it cuts the power consumption in half.\n\n\">Cela augmente la surface de la puce de 10%, mais r\u00e9duit la consommation d&rsquo;\u00e9nergie de moiti\u00e9.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"The most common encryption protocol to use elliptic-curve cryptography is called the datagram transport layer security protocol, which governs not only the elliptic-curve computations themselves but also the formatting, transmission, and handling of the encrypted data.\">Le protocole de cryptage \u00e0 courbe elliptique le plus courant est appel\u00e9 protocole de s\u00e9curit\u00e9 de la couche de transport de datagrammes, qui r\u00e9git non seulement les calculs elliptiques eux-m\u00eames, mais aussi le formatage, la transmission et le traitement des donn\u00e9es crypt\u00e9es. <\/span><span title=\"Here, the entire protocol is hardwired into the MIT researchers\u2019 chip, which dramatically reduces the amount of memory required for its execution.\n\n\">Ici, le protocole entier est c\u00e2bl\u00e9 dans la puce des chercheurs du MIT, ce qui r\u00e9duit consid\u00e9rablement la quantit\u00e9 de m\u00e9moire n\u00e9cessaire \u00e0 son ex\u00e9cution.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"The chip also features a general-purpose processor that can be used in conjunction with the dedicated circuitry to execute other elliptic-curve-based security protocols.\">La puce comporte \u00e9galement un processeur polyvalent qui peut \u00eatre utilis\u00e9 en conjonction avec les circuits d\u00e9di\u00e9s pour ex\u00e9cuter d&rsquo;autres protocoles de s\u00e9curit\u00e9 bas\u00e9s sur des courbes elliptiques. <\/span><span title=\"But it can be powered down when not in use, so it doesn\u2019t compromise the chip\u2019s energy efficiency.\">Mais il peut \u00eatre mis hors tension lorsqu&rsquo;il n&rsquo;est pas utilis\u00e9, de sorte a ne pas compromettre l&rsquo;efficacit\u00e9 \u00e9nerg\u00e9tique de la puce.<\/span><\/span><\/p>\n<p>MIT \u2013 <a href=\"http:\/\/www.mit.edu\">www.mit.edu<\/a><\/p>\n<p><strong>La r\u00e9daction vous conseille aussi:<\/strong><\/p>\n<p><a href=\"http:\/\/www.electronique-eci.com\/news\/systeme-de-cryptage-avec-periode-dessai-gratuite-de-30-jours\"><strong>Syst\u00e8me de cryptage avec p\u00e9riode d&rsquo;essai gratuite de 30 jours<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/www.electronique-eci.com\/news\/lantivirus-qui-trompe-les-pirates\"><strong>L&rsquo;antivirus qui trompe les pirates<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/www.electronique-eci.com\/news\/comment-can-peut-offrir-une-cybersecurite-sans-cryptage\">Comment CAN peut offrir une cybers\u00e9curit\u00e9 sans cryptage<\/a><\/p>\n<p><strong>Related articles:<\/strong><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/encryption-perspectives-world-quantum-computers\">Encryption perspectives in a world of quantum computers<\/a><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/chacha20poly1305-authenticated-encryption-ip-targets-iot\">Chacha20\/poly1305 authenticated encryption ip targets iot<\/a><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/infineon-responds-encryption-chip-vulnerability\">Infineon responds to encryption chip vulnerability<\/a><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/iot-encryption-revenue-driver-csps\">IoT encryption: a revenue driver for CSPs<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les protocoles de cryptage \u00e0 cl\u00e9 publique sont compliqu\u00e9s et dans les r\u00e9seaux informatiques, ils sont ex\u00e9cut\u00e9s par un logiciel, ce qui les rend tr\u00e8s p\u00e9nalisants pour les dispositifs IoT \u00e0 faible puissance de calcul. Si les capteurs int\u00e9gr\u00e9s doivent optimiser la dur\u00e9e de vie de leur batterie, ils ne peuvent pas se permettre la consommation d&rsquo;\u00e9nergie et de m\u00e9moire que necessite l&rsquo;ex\u00e9cution logicielle des protocoles de cryptage.<\/p>\n","protected":false},"author":22,"featured_media":130143,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[883],"tags":[893,906],"domains":[47],"ppma_author":[1149],"class_list":["post-130142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologies","tag-authentication-encryption-fr","tag-mpus-mcus-fr","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 5...<\/title>\n<meta name=\"description\" content=\"Les protocoles de cryptage \u00e0 cl\u00e9 publique sont compliqu\u00e9s et dans les r\u00e9seaux informatiques, ils sont ex\u00e9cut\u00e9s par un logiciel, ce qui les rend tr\u00e8s...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130142\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide\" \/>\n<meta property=\"og:description\" content=\"Les protocoles de cryptage \u00e0 cl\u00e9 publique sont compliqu\u00e9s et dans les r\u00e9seaux informatiques, ils sont ex\u00e9cut\u00e9s par un logiciel, ce qui les rend tr\u00e8s p\u00e9nalisants pour les dispositifs IoT \u00e0 faible puissance de calcul. Si les capteurs int\u00e9gr\u00e9s doivent optimiser la dur\u00e9e de vie de leur batterie, ils ne peuvent pas se permettre la consommation d&#039;\u00e9nergie et de m\u00e9moire que necessite l&#039;ex\u00e9cution logicielle des protocoles de cryptage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130142\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-14T16:03:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/n-mit-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"948\" \/>\n\t<meta property=\"og:image:height\" content=\"632\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eeNews Europe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eeNews Europe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/\"},\"author\":{\"name\":\"eeNews Europe\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\"},\"headline\":\"Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide\",\"datePublished\":\"2018-02-14T16:03:24+00:00\",\"dateModified\":\"2018-02-14T16:03:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/\"},\"wordCount\":718,\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"keywords\":[\"Authentication &amp; Encryption\",\"MPUs\/MCUs\"],\"articleSection\":[\"Technologies\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/\",\"name\":\"Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2018-02-14T16:03:24+00:00\",\"dateModified\":\"2018-02-14T16:03:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\",\"name\":\"eeNews Europe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"caption\":\"eeNews Europe\"}}]}<\/script>","yoast_head_json":{"title":"Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 5...","description":"Les protocoles de cryptage \u00e0 cl\u00e9 publique sont compliqu\u00e9s et dans les r\u00e9seaux informatiques, ils sont ex\u00e9cut\u00e9s par un logiciel, ce qui les rend tr\u00e8s...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130142\/","og_locale":"fr_FR","og_type":"article","og_title":"Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide","og_description":"Les protocoles de cryptage \u00e0 cl\u00e9 publique sont compliqu\u00e9s et dans les r\u00e9seaux informatiques, ils sont ex\u00e9cut\u00e9s par un logiciel, ce qui les rend tr\u00e8s p\u00e9nalisants pour les dispositifs IoT \u00e0 faible puissance de calcul. Si les capteurs int\u00e9gr\u00e9s doivent optimiser la dur\u00e9e de vie de leur batterie, ils ne peuvent pas se permettre la consommation d'\u00e9nergie et de m\u00e9moire que necessite l'ex\u00e9cution logicielle des protocoles de cryptage.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130142\/","og_site_name":"EENewsEurope","article_published_time":"2018-02-14T16:03:24+00:00","og_image":[{"width":948,"height":632,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/n-mit-security.jpg","type":"image\/jpeg"}],"author":"eeNews Europe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eeNews Europe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/#article","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/"},"author":{"name":"eeNews Europe","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4"},"headline":"Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide","datePublished":"2018-02-14T16:03:24+00:00","dateModified":"2018-02-14T16:03:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/"},"wordCount":718,"publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"keywords":["Authentication &amp; Encryption","MPUs\/MCUs"],"articleSection":["Technologies"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/","url":"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/","name":"Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2018-02-14T16:03:24+00:00","dateModified":"2018-02-14T16:03:24+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/puce-de-cryptage-a-cle-publique-tres-basse-consommation-et-500x-plus-rapide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4","name":"eeNews Europe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22","url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","caption":"eeNews Europe"}}]}},"authors":[{"term_id":1149,"user_id":22,"is_guest":0,"slug":"eenews-europe","display_name":"eeNews Europe","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130142"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=130142"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130142\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/130143"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=130142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=130142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=130142"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=130142"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=130142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}