Pairing-Based Cryptography – Pairing 2010

Analysis of affine coordinates for pairing computation. Construction of designated connfirmer signature and its application to optimistic fair exchange. Designing a code generator for pairing based cryptographic functions and efficient constructions.

Подобные документы

  • Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.

    книга, добавлен 08.03.2014

  • Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.

    статья, добавлен 19.07.2020

  • Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.

    книга, добавлен 08.03.2014

  • The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.

    книга, добавлен 18.09.2012

  • The massage recovery feature as independent of the choice of the signature equation and that all ElGamal type schemes have variants giving message recovery and archive five new signature schemes giving message recovery with different properties.

    статья, добавлен 15.09.2012

  • New cryptosystems and optimizations. The security of all bits using list decoding. A lattice construction for partial key exposure attack for RSA. Controlling access to an oblivious database using stateful anonymous credentials. Identity-based encryption.

    материалы конференции, добавлен 08.03.2014

  • Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.

    дипломная работа, добавлен 13.07.2020

  • The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.

    учебное пособие, добавлен 08.03.2014

  • The principle of quantum cryptography. Quantum no-cloning theorem. State detection and random number generator. Verify assumptions used in a security proof. Quantum hacking and countermeasures from this. Introduction of cryptography for engineers.

    книга, добавлен 08.03.2014

  • Analysis of the extended euclidean algorithm. Analysis of operations in the residue class ring. Structure of the multiplicative group of residues mod a prime number. Symmetric and asymmetric cryptosystems. Compression functions from encryption functions.

    книга, добавлен 08.03.2014

  • Basics of Contemporary Cryptography for Information Technology Practitioners. Codes for Error Detection. Advances in Coding Theory and Cryptography. Arcs, minihypers, and the classification of three-dimensional Griesmer codes. About the code equivalence.

    книга, добавлен 08.03.2014

  • Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.

    книга, добавлен 08.03.2014

  • Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.

    курс лекций, добавлен 08.03.2014

  • Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.

    книга, добавлен 08.03.2014

  • Analysis of developing classification task based on structural connectomes. Custom metrics based on random walk logarithms. Performance metric and hyperparameters grid search. Results obtained for this functional connectivity based parcellation scheme.

    дипломная работа, добавлен 27.08.2016

  • Rubik’s cube 3D model. Hardware and software systems for rubik’s cube solving. Designing and developing application for assembling a rubik's cube. Preventing wrong moves algorithm. Introduction to group theory and permutation puzzles. Computer vision.

    дипломная работа, добавлен 01.12.2019

  • A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.

    курс лекций, добавлен 08.03.2014

  • Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.

    статья, добавлен 26.01.2018

  • In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.

    статья, добавлен 07.12.2016

  • A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.

    книга, добавлен 08.03.2014

  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    книга, добавлен 08.03.2014

  • Antivirus is used to prevent, detect and remove malware, including computer viruses and worms. Such programs may also prevent and remove adware, spyware and other forms of malware. Identification methods: signature based detection and file emulation.

    доклад, добавлен 04.12.2011

  • Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.

    научная работа, добавлен 15.09.2012

  • Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.

    статья, добавлен 27.05.2021

  • The structure chart of identification using n-th order volterra model in frequency domain using interpolation method. Numerical values of identification accuracy. The simulink model of the test system with noise generator, osillosopes. Wavelet function.

    статья, добавлен 28.08.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.