Cryptography: Theory and Practice
The book is organized into three parts. The first part covers private-key cryptography. Chapters 4-9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas in cryptography.
Подобные документы
Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.
материалы конференции, добавлен 08.03.2014Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.
книга, добавлен 08.03.2014Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.
статья, добавлен 17.12.2022Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.
книга, добавлен 08.03.2014Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
книга, добавлен 08.03.2014Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.
книга, добавлен 08.03.2014Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.
книга, добавлен 08.03.2014An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.
статья, добавлен 15.09.2012- 59. Brute force
Consideration of the state of US policy in the area of private and public encryption of data. An analysis of the legality of the use by the state of private information about their citizens fininsah. The study of features the standard encryption.
книга, добавлен 08.03.2014 The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016The means of digital communications in the field of public administration and cyber education. The definition of "Instant messages" and "chatbot" is defined. The impact of the COVID-19 pandemic on the development of digital communication systems.
статья, добавлен 03.02.2021Deep learning is one of the most active research fields in machine learning community. It has gained unprecedented achievements in fields such as computer vision, natural language processing and speech recognition. Сhallenges posed by Big Data analysis.
статья, добавлен 18.02.2021Theory and tools communication. Effect of employees at computer system. The importance of accurate pronunciation and eye contact. Gestures and body language programs. Back channels and turn-taking. Multiplexing – several topics in one utterance.
лекция, добавлен 28.12.2013The use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR to analyze the Needham-Schroeder public key protocol. This is used as a basis to compare and contrast the two systems and out possible future directions for research.
статья, добавлен 15.09.2012Определение службы каталогов Active Directory, ее характеристика с точки зрения практики. Анализ внутренней структуры и именования. Описание хранилища данных и типов сведений, которые в нем находятся. Особенности администрирования Active Directory.
презентация, добавлен 29.03.2016In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.
книга, добавлен 09.04.2013Проектирование, построение, конфигурирование структуры каталогов организации с использованием OS Microsoft Windows Server 2008r2. Организация Active Directory, планирование доменной структуры. Реализация модели доступа к информационным ресурсам компании.
курсовая работа, добавлен 28.09.2017Роль службы каталогов Active Directory в обеспечении сетевой безопасности. Работа со службой Active Directory. Распределение информации по доменам и подразделениям. Отношения доверия между доменами. Аутентификация и управление доступом к информации.
статья, добавлен 28.10.2012Perform the comprehensive analysis of the GraphQL field by first outlining the GraphQL concept and its structure, followed by an organized mapping analysis of main studies. Delves and highlights the importance of adept testing in the GraphQL era.
статья, добавлен 24.02.2024The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.
статья, добавлен 23.02.2016- 71. Управление конфигурацией Windows Server 2008. Установка первого контроллера домена. Добавление ролей
Предназначение Active Directory, ее функции (безопасное хранилище данных и пр.). Служба доменных имен (DNS): назначение и функции. Установка первого контроллера домена: установка роли Active Directory, DNS, их настройка. Настройка политики паролей.
лабораторная работа, добавлен 28.04.2017 Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.
книга, добавлен 19.03.2014With the rapid development of modern information technologies, their integration into all areas of education is accelerating, the penetration of innovations into the education space. Information technology as an integral part of modern education.
статья, добавлен 19.09.2024A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
статья, добавлен 15.09.2012- 75. Основные идеи объектно-ориентированного программирования в Turbo-Pascal и способы их использования
Turbo Pascal и объектно-ориентированное программирование. Основные принципы ООП: инкапсуляция, наследование и полиморфизм. Создание объектов в Turbo-Pascal при помощи зарезервированных слов object, constructor, destructor, private, public и virtual.
реферат, добавлен 28.04.2011