Topical issues of cryptography

Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.

Подобные документы

  • Researching network attacks, security audit tools. Securing the router for administrative Access. Configuring a site-to-site VPN using cisco IOS and SDM. Configuring a remote Access VPN server and client. Security policy development and implementation.

    учебное пособие, добавлен 08.03.2014

  • The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.

    учебное пособие, добавлен 15.09.2012

  • To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.

    статья, добавлен 29.01.2016

  • The principles of construction of the integrated modular avionics aircraft and its functional elements. Methods and means of control of IMA computer systems. Evaluate the reliability of IMA computing structures for different hardware configurations.

    статья, добавлен 13.07.2022

  • A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.

    курс лекций, добавлен 08.03.2014

  • Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.

    книга, добавлен 08.03.2014

  • This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.

    книга, добавлен 25.11.2013

  • Назначение НРС-систем (High Performance Computing). Возможность полного упразднения межпроцессорного обмена в сетях между узлами, имеющими непосредственную связь. Оптимизация использования сетевых технологий обмена. Маршруты передачи информации.

    статья, добавлен 14.09.2016

  • Machine learning is a set of algorithms and tools that help machines understand hidden patterns in data and exploit the structure and substance of those hidden patterns. The history of the emergence of architectures of increased computing power.

    статья, добавлен 24.02.2024

  • Создание программного обеспечения для распознавания и анализа лица человека с использованием системы face control. Разработка структуры и алгоритма работы адаптивного децентрализованного комплекса визуального определения объектов и их перемещения.

    дипломная работа, добавлен 25.05.2018

  • The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.

    статья, добавлен 24.10.2018

  • A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.

    статья, добавлен 15.09.2012

  • Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.

    статья, добавлен 27.10.2020

  • The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.

    статья, добавлен 30.07.2016

  • The analysis of the existing training methods of multilayer neural network of computing structures is carried out. Recommendations of selected methods usage by examples of multilayer approximation tasks for technology of beneficiation were given.

    статья, добавлен 28.02.2016

  • Geometrical form of normal wear of die's working surface. Measuring system on base of threecoordinate machine-tool with numerical program control. Profile of natural wear of die is described by polynomial of third order with high degree of authenticity.

    статья, добавлен 14.09.2016

  • The problem of constructing a system of operational dispatch management for agricultural enterprises. The choice of the functionality of the control plane, allowing to minimize the losses due to delays and poor implementation of the Executive plan.

    статья, добавлен 25.12.2016

  • One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.

    статья, добавлен 15.09.2012

  • The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.

    контрольная работа, добавлен 07.08.2017

  • Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.

    научная работа, добавлен 15.09.2012

  • The invention of the computer. Babbage's demonstration model mechanical calculator. Sequence of operations for column. The logical structure of the Analytical Engine. The programming language. Mechanical calculation device based on the design in 1853.

    реферат, добавлен 17.12.2015

  • Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.

    курс лекций, добавлен 08.03.2014

  • The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.

    статья, добавлен 01.11.2021

  • Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.

    учебное пособие, добавлен 08.03.2014

  • Development of a new complex oscillator for effective algorithmic trading in the stock market. Technical indicators on which the oscillator is based and the rule base for its construction. Oscillator calculation algorithm using QuantOffice software.

    статья, добавлен 09.08.2022

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.