Advances in Cryptology
Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
Подобные документы
To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
??????, добавлен 29.01.2016Private versus public key cryptography. Variable changes and normal forms. Elliptic curves over finite fields. The baby-step giant-step algorithm. Counting points on elliptic curves. Isogenies and modular polynomials. The Schoof-Elkies-Atkin algorithm.
?????, добавлен 08.03.2014A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
??????, добавлен 15.09.2012Show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the form xi + c. The strategy – a general outline. Polynomial construction.
???? ??????, добавлен 08.03.2014?he main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.
??????, добавлен 09.10.2018The Needham-Schroeder public-key authentication protocol. An attack on the protocol and the consequences of this attack. Proving that the revised protocol is safe against all attacks which not dependent upon properties of the encryption method used.
??????, добавлен 15.09.2012Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.
???????????, добавлен 28.12.2013The study and practice information Illustration of simple cipher. Cryptography as to encryption, the process of converting ordinary information into unintelligible gibberish. Decryption is the reverse, moving from unintelligible ciphertext to plaintext.
?????, добавлен 08.03.2014??????????? ??????? ?????????? ??????. ??????? "???????????" ??????????. ?????? ???? ??????, ???????????? ?? ??????? ?????, ??? ?????? ????????? Secure Disk. ?????????? "?? ????" ???????? TrueCrypt. ??????? ??????? ??????????? ? ????? ?? ???????????.
???????, добавлен 10.06.2011Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.
??????, добавлен 20.03.2024Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.
????????? ???????????, добавлен 08.03.2014?????????? ??????? ????????? ??????????? ?????? ?????????????????? ????????? "quantum computing". ?????????????????? ??????? ????????? ?????? ???????????? ??????? ?????????? ???????? "Travelling Is Simple". ?????? ?? ?????? ?? ??????????? ???????.
???????? ??????, добавлен 24.03.2016Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.
???????????? ??????, добавлен 29.11.2014Exploring the world of covert communication. Hiding the goods with steganography. The hidden realm of steganography. Products that implement steganography. Sending stego files across a network. Ways by developing your secure communications strategy.
?????, добавлен 08.03.2014Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
??????, добавлен 18.09.2020Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
??????, добавлен 27.05.2021Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.
??????, добавлен 01.12.2017?????? ????????? ???????????? ??????????? ?? ???? ?????????? ???????? ????????? ??????? ??????? ?????? ??? ?????? ?????????? in-memory computing. ???? ????????????? ?????????? ? ???????? ????????????? ???????????? ??? ????? ? ?????? ? ???????????.
??????, добавлен 18.03.2018One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.
??????, добавлен 15.09.2012A wireless sensor network of distributed autonomous sensors to monitor physical or environmental conditions and to cooperatively pass their data through the network. The analysis of models of wireless sensor network with random access is presented.
??????, добавлен 26.08.2016Hereditary Information and Protein Biosynthesis. Gel Electrophoresis and Direct Sequencing. Generalized Sux Trees and the Substring Problem. Ecient Computation of Overlaps. Denition and Scoring of Multiple Alignments. The FASTA and BLAST Heuristic.
??????? ???????, добавлен 25.11.2013The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
??????, добавлен 22.02.2023Investigation of a person's ability to work with information. Study of the neural executive mechanisms of the brain. Creation of a multicomponent model of short-term memory of Russian students, the development of their creative and intellectual abilities.
??????, добавлен 07.04.2021Exploring different ways of assessing the value of hard currency. Calculating the hard currency exchange rate using a stack of technologies already used in the company. Distribution of income for game content. Improved dashboards for game producers.
???????? ??????, добавлен 17.07.2020Analysis of affine coordinates for pairing computation. Construction of designated connfirmer signature and its application to optimistic fair exchange. Designing a code generator for pairing based cryptographic functions and efficient constructions.
?????, добавлен 08.03.2014