Cryptography: Theory and Practice
The book is organized into three parts. The first part covers private-key cryptography. Chapters 4-9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas in cryptography.
Подобные документы
Application of mathematical methods - important condition in the analysis, work optimization of industrial structures. Use of the device of imitating modeling for research of production systems. The program table parameters for collecting statistics.
дипломная работа, добавлен 10.11.2014Общая характеристика программируемой логики. Изучение особенностей языка описания цифровых устройств VHDL. Разработка методики деятельности ПЛИС в системе автоматизированного проектирования Active-HDL. Обзор и принципы работы основных редакторов.
дипломная работа, добавлен 14.03.2015Type theory introduced by Russell and Whitehead to overcome a paradox found in Frege’s work. The design of lambda-calculus in functional programming languages. The isomorphism between concepts of logic and concepts in type theory and programming.
статья, добавлен 22.02.2021Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
курс лекций, добавлен 08.03.2014Процес реєстрації користувачів в базі даних Active Directory. Розробка програми, що буде створювати облікові записи користувачів та наділяти їх відповідними правами. Засіб програмування Microsoft Visual Studio 2010. Випробування програмного продукту.
курсовая работа, добавлен 30.12.2013Директория Active Directory как основа корпоративных сетей на базе Windows Server, где хранятся все учетные записи пользователей. Инструментарий PowerShell, позволяющий автоматизировать массовые действия, направленные на большое количество объектов.
курсовая работа, добавлен 11.04.2019Службы Active Directory (службы активного каталога) - распределённая база данных, которая содержит все объекты домена. Единая точка аутентификации. Повышенный уровень информационной безопасности. Интеграция с корпоративными приложениями и оборудованием.
отчет по практике, добавлен 17.05.2021Теоретические основы инфраструктуры Active Directory: логическая структура, объекты и домены. Физическая структура сети и контроллеры домена. Внутрисайтовая репликация, проектирование структуры организационных единиц. Параметры программ и Windows.
курсовая работа, добавлен 03.10.2014- 84. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Research of digitalization as the leading global trend of modern economic development. Promising areas of IT application in agricultural enterprises. The place of online IT services in the innovative renewal of the crop production industry in Ukraine.
статья, добавлен 30.08.2022Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.
статья, добавлен 09.01.2024Research and analysis of ways to solve the problem of reducing the expressions obtained in solving the naval system. Structure of Stokes equations. Development and analysis of an equivalent reduction algorithm based on the theory of chain fractions.
статья, добавлен 22.12.2016The article deals with the notion of concept and cognitive conceptual components in the Internet users' names. The basis conceptual spheres and concrete concepts created by the Internet users in the process of communication have been identified.
статья, добавлен 09.05.2020Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
презентация, добавлен 18.11.2015Theoretical aspects of the development of digital platform for engineering controlling business. Digital platform as part of the global economy. Conceptual apparatus for the research. Problems of product exchange between the city and the rural settlement.
дипломная работа, добавлен 14.12.2019The state research and pioneer computers. Data Processing Industry аnd Market Until. Calculators in French State Research. The Computer Industry: companies’ behaviour, strategies and the component problem. A client for the Semiconductor Industry.
статья, добавлен 18.11.2018Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.
курсовая работа, добавлен 25.06.2017Analysis of the prospects for using artificial intelligence technologies in the field of photo processing. Research of modern technologies and AI methods that are used in processing photo materials. Review of areas of AI use in image processing.
статья, добавлен 08.06.2024This paper presents a comprehensive algorithm for creating an automated system to collect, store, analyze and research data from a business. Its main features include synchronization with, and output to, an application installed on a PC or smartphone.
статья, добавлен 26.10.2020Development of an integrated S-O-R model taking into account cognitive-affective-conative aspects, which adds a new direction to the research of trust in UGC. Life satisfaction and Internet satisfaction as two main mechanisms of online content exchange.
статья, добавлен 23.05.2023Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
диссертация, добавлен 01.09.2018Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.
учебное пособие, добавлен 08.03.2014GNU General Public License (Универсальная общественная общедоступная лицензия GNU) — лицензия на свободное программное обеспечение, созданная в рамках проекта GNU. Свободы и обязательства получателям компьютерных программ. Её совместимость и копилефт.
реферат, добавлен 09.02.2017Instructional design model is approaching creating rules to address into learning. The model was designed for simulation and that may easy to utilize by adept and beginner. The Ausubel’s Assimilation Theory is theory focus on "meaningful learning".
реферат, добавлен 06.02.2014- 100. The theory of plafales: новий підхід до конструювання базисних функцій на трикутнику першого порядку
На основі the theory of plafales, показані основні кроки алгоритму конструювання базисних функцій в МСЕ на основі двовимірного симплексу — трикутника першого порядку. Конструювання базисних функцій в автоматичному режимі з компонентом штучного інтелекту.
статья, добавлен 25.08.2016